{"id":3150,"date":"2020-07-17T12:33:25","date_gmt":"2020-07-17T16:33:25","guid":{"rendered":"https:\/\/www.gocomputek.com\/?p=3150"},"modified":"2021-04-09T11:21:06","modified_gmt":"2021-04-09T15:21:06","slug":"ransomware-101","status":"publish","type":"post","link":"https:\/\/www.gocomputek.com\/ransomware-101\/","title":{"rendered":"Ransomware 101"},"content":{"rendered":"\n

Ransomware attacks are on the rise in the COVID-19 environment. The most notable targets have been healthcare systems and financial institutions. Not surprisingly, individual users have also fallen prey to Coronavirus-themed scams. While Coronavirus scams are a new attack vector for threat actors, end-users should take the same precautions. The question for every organization is this: Has your company invested in safety measures against ransomware?<\/p>\n\n\n\n

The Basics<\/h4>\n\n\n\n

In a recent survey<\/a> of 3,500 workers across seven countries, just 31% correctly understood the definition of ransomware. This fact helps explain why these attacks continue to succeed in so many business sectors all over the world. If end-users don\u2019t know what ransomware is, they can\u2019t protect themselves and their organization from attacks.<\/p>\n\n\n\n

So, what is ransomware? It is a form of malicious software that infects individual computers and the other devices with which they are networked. The software encrypts data in the network. The bad actors responsible for the attack will then send a message to the end-user demanding a ransom payment to return their data. Threat actors who disseminate this malicious software do not always immediately deploy its encryption capability. They will often spy on a network for weeks or even months gathering information, passwords and any pertinent data that they can use to ensure the biggest payout possible. This is especially true of system backups. Bad actors will often try to disable system backups weeks before launching an attack.<\/p>\n\n\n\n

SMBs Are Not Immune<\/h4>\n\n\n\n

Emisoft estimates<\/a> that ransomware demand costs could exceed $1.4 billion in the U.S. in 2020. Unfortunately for small and medium-sized businesses, this includes a surge in attacks towards them as well. Last year saw an upswing in ransomware attacks on SMBs. Datto recently reported<\/a> that one in five SMBs were the targets of such an attack in 2019. Ransomware payouts are not the only costs associated with these kinds of attacks. The full costs to organizations include downtime, replacement and repair of machines, loss of reputation, loss of clients and damage to the brand. The average cost to recover from a ransomware attack increased 200% between 2018 and 2019. Datto estimates that downtime associated with these attacks cost SMBs an average of $141,000 last year. That price tag could be a disruptive blow to many small or medium-sized businesses.<\/p>\n\n\n\n

What You Can Do<\/h4>\n\n\n\n

A well-trained staff is the best defense against a ransomware attack. Because most ransomware payloads are still delivered through phishing emails<\/a>, training end-users to identify bogus emails is imperative. DNS protection, e-mail filtering and anti-virus are also crucial components of prevention. Once the malware makes its way into a machine and in turn, a network, a company\u2019s security apparatus is their only hope. Therefore, preparation is key. Below is our comprehensive approach to ransomware.<\/p>\n\n\n\n

<\/div>
\n
<\/div>
\n

Prevent<\/h4>\n\n\n\n