The most common way for ransomware to get into your network are through emails and websites. One email is all it takes! We are so used to using email-from our personal life to our businesses-that getting someone to click a link is simple. Ransomware attacks us and disguises legitimate email that can trick us or our employees into clicking through an infected website or opening an infected attachment. These criminals are really good at faking internal emails and general inquires. The ransomeware can be hidden in normal attachments such as invoices or reports.
Cyber criminals will infect any web-page they can get their hands on. Infected websites are not always obvious so be sure to avoid less reputable sites. But remember, that mainstream websites, such as MSN and The New York Times have been infected in the past and exposed thousands of their visitors through malicious ads.
What happens during an attack? As soon as it is in, the ransomeware scans local and connected drives (including back-ups) and encrypts thousands of files. Within minutes, everything from Office to multimedia is locked up-making it inaccessible to all users. You then get your notification that you are locked out with instructions on how to pay and how to unlock your computer. Typical solutions include: restoring from safe-external backups, wiping the entire system and starting again, or paying the ransom and learning a hard lesson in data security.
To learn how we can help you with a complete data security plan, including safe backups, call us at 937-660-4899.