Contact Us

    Please prove you are human by selecting the Tree.

    Ransomware, a treat to your business and data
    post-template-default,single,single-post,postid-322,single-format-standard,bridge-core-1.0.6,ajax_fade,page_not_loaded,,qode_grid_1300,side_area_uncovered_from_content,footer_responsive_adv,qode-content-sidebar-responsive,qode-theme-ver-18.2,qode-theme-bridge,wpb-js-composer js-comp-ver-6.0.5,vc_responsive

    Ransomware, a treat to your business and data

    Ransomware, a treat to your business and data

    Ransomware poses a real threat to businesses and individuals – and is arguably one of the most damaging threats to business operations and reputation currently.

    Most recently the WannaCry malware infected two large corporations in Spain and Britain. It spread through the internal NHS network within four hours, they weren’t specifically targeted – but their network was vulnerable due to an outdated operating system.

    What is Ransomware?

    Ransomware is a malware that infects a computer (and/or network) and encrypts all its files. Cybercriminals then offer an ultimatum to their victim: pay the demanded ransom or lose your data forever.

    How does is it work?

    When a computer is infected, ransomware typically contacts a central server for the information it needs to activate – and then begins encrypting files on the infected computer. Once all the files are encrypted it posts a message asking for payment to decrypt the files.

    Once your files are encrypted by ransomware there isn’t much you can do if you do not have back-up files.

    What you can do to minimize your risk against ransomware

    1. Reduce your vulnerability by backing up your company data on a regular basis. Make use of offsite or Azure backup.
    2. Educate employees on email and website safety practices.
    3. Ensure your network is protected and you have an antivirus programme installed.
    4. Keep your computer’s operating system (like Microsoft) updated.

    Contact Uthanda ICT today for an IT risk assessment.

    No Comments

    Post A Comment