- a type of malicious software designed to block access to a computer system until a sum of money is paid.
Most ransomware versions encrypt the files on the affected computer, making them inaccessible, and demand a ransom payment to restore access.
Do’s and Don’ts
Ransomware has become a lucrative industry for criminals, and it’s still on the rise! Due to these uncertain times caused by the pandemic, researchers estimate the number of ransomware attacks grew by more than 150% in 2020.
COVID-19 left many organizations vulnerable to cyber threats. During the height of the pandemic crisis, ransomware grew in numbers but also in scale and sophistication – the average ransom demand increased by more than twofold and amounted to $170,000 in 2020. The attacks also caused, on average, 18 days of downtime for the affected companies.
18 days! Can your company afford to have 18 days of downtime?
Did You Know:
Most ransomware attacks that have taken place have been linked to poor protection practices by employees.
Let’s look at a few do’s and don’ts when it comes to ransomware.
- Do Not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee you will regain access to your files.
- Do Not provide personal information when answering an email, unsolicited phone call, text message, or instant message. Phishers will try to trick employees into installing malware or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
- Do restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
- Do use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date is critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
- Do employ content scanning and filtering on your mail servers. Inbound emails should be scanned for known threats and should block any attachment types that could pose a threat.
- Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
Ransomware criminals often attack small and medium-sized businesses. Don’t just hide behind your masks and think this can’t or won’t happen to you! By being proactive and letting PCS, as a Total Secure IT Provider, manage your protection, detection, and recovery, you can rest soundly.
Cyber Risk is complex and can’t be determined comprehensively without using a combination of tools and techniques. Our process begins with a Comprehensive CRA.
OUR COMPREHENSIVE CYBERSECURITY RISK ASSESSMENT:
- Complete Network Assessment
- Security & Vulnerability Assessment
- Data Risk Scan
- Dark Web Search
- Simulated Phishing Campaign
- Cyber Liability Insurance Review
PCS Cybersecurity TSSP (total Secure services provider) Offerings:
- Security Operations Center (SOCaaS)
- End Point Security – Detection & Response
- Intrusion – Detection & Prevention
- Security Information Event Management (SIEM )
- Vulnerability & Pen Testing
- Threat Hunting
- Multi-Factor Authentication (MFA)
- Data Risk Management
- Email Archiving – Security & Encryption
- vCISO (Virtual Chief Information Security Officer)
- Forensics Remediation & Disaster Recovery
- Data Storage – Colocation
Education & Training
- Security Awareness Training
- Phishing Campaigns
- Employee Vulnerability Assessment
Governance Risk & Compliance Assessments
- ISO 27001/2
Maintaining a strong firewall and keeping your security software up-to-date is critical, as well as educating your employees on best practices. As always, we are here to help. If you need help with protection, detection, and recovery PCS is here for you.
Have a question? Reach out today! (256) 513-8206
PCS Provides Total Secure IT Services
When is the last time you considered exactly what is at risk within your business? What’s in your Cyber stack? These questions and more are answered in our monthly blog posts.