15 Aug, 2016
Ransomware is now the most lucrative form of Malware in history. A new report from Malware Bytes now suggests that last year 54% of UK businesses were targeted with an attack.
Ransomware describes when an attacker has the means to lock your computer and devices or encrypts files so that they cannot be accessed. Your attacker then demands payment in order to restore your device/files.
This form of malware is on the rise and reports suggest that most businesses are not prepared to face an attack. Many businesses do not have the right infrastructure in place and are unable to detect the threat quick enough. Cisco’s Midyear Cybersecurity Report suggests that it takes on average 200 days for a company to identify a threat.
So, how can my business reduce the risk of falling foul to a hacker?
Cisco advises companies take steps to protect themselves by:
The National Cyber Skills Centre and most organisations advise against the payment of ransom demands because:
There are some free decryption tools available online. “No More Ransom” is a new initiative (announced on July 25th) to help people in America and Europe reduce the risk of being hacked.
The initiative suggests 4 decryption tools for types of ransomware; CoinVault, Cryptokluchen, Rannoh and TeslaCrypt.
Threats can be as simple as opening an email. Are your staff trained to spot fake emails? Do they pro-actively look for something out of place? Book a place on our upcoming Information Security Training Course on 27th September, to minimise threats to your business.
Sources: The Guardian, IT Pro Portal, Data Breach Today
ISO Quality Services Ltd are proud to specialise in the implementation and certification of the Internationally recognised ISO and BS EN Management Standards.
Do you want to get ahead of your competition? Win more tenders or save time and money on reoccurring issues? Contact us today on 0330 058 5551 or email email@example.com.
Alternatively, you can request a quote by filling out our enquiry form and a member of our team will be in touch shortly.