SlideShare a Scribd company logo
1 of 17
Download to read offline
WHAT IS RANSOMWARE??
RANSOMWARE IN ONE IT TOPIC
THAT DOESN’T SEEM TO BE LOSING
MOMENTUM ANY TIME SOON..
Attacks on various industries are becoming
daily occurrences. We hear of companies
paying huge sums to retrieve their data from
the malicious software. Often, the companies
affected aren’t familiar with ransomware
until it’s too late. So, allow us to introduce
you to the infamous ransomware.
Ransomware comes in quite the variety pack these
days, but let’s start by cancelling out some definitions.
RANSOMWARE IS NOT…
‘Malware’ is an umbrella term used to refer to a variety of forms of hostile
or intrusive software, including computer viruses, worms, trojan horses,
ransomeware, spyware, adware, scareware, and other maliicious programs. It can
take the form of executable code, scripts, active content, and other software.
RANSOMWARE ≠ MALWARE
RANSOMWARE ≠ RANSOM
Ransom is the practice of holding a prisoner or item to extort money or property
to secure their release, or it may refer to the sum of money involved. In an early
German law, a similar concept was called weregild.
While ransomware is a form
of malware, it’s definitely
unique in what it does.
Sprinkle in some ‘ransom’
and you’ve got a malicious
virus that keeps your data
encrypted until ransom
is paid (usually in bitcoins).
SO AS AN SMB, WHY
SHOULD YOU CARE?
THE NUMBERS TELL
A DARK TALE!
SO WHAT’S THE CURRENT
STATE OF RANSOMWARE?
There have been more than
700,000 ransomware
attempts between
2015-2016.
Source: Kaspersky Labs
IT’S PRETTY CONTAGIOUS!
More ransomware attacks
are hitting entire networks.
The healthcare industry has
recently experienced this.
Source: CIO
AND IT’S NOT CHEAP TO RECOVER FROM!
In 2016 alone, more
than £150 million
has been paid out
by victims.
Source: CNN
NOT ONLY IS RANSOMWARE BECOMING MORE
COMMON, BUT IT’S ALSO EXPENSIVE AND CAN
HALT AN ENTIRE SYSTEM.
As an SMB, it’s painful to your
bottom line. We decided to
ask some IT professionals for
their thoughts and noticed
a common trend…
BUSINESS CONTINUITY.
WHILE BUSINESS CONTINUITY CAN’T PREVENT
RANSOMWARE FROM ATTACKING, IT CAN
PREVENT IT FROM SUCCEEDING!
When it comes to ransomware, it’s not
a matter of IF but WHEN.
Business continuity will give you
access to your captive data.
No hostages here!
CODY ARNOLD
Backup Engineer
Bizco Technologies
Ransomware is a threat to your business
and your ability to function. Not having a
proper backup/disaster recovery solution in
place could be crippling.
Imagine losing all of your data unless you pay a ransom of
hundreds or thousands of dollars in a currency you don’t
understand. You may pay the ransom and still not get your
data back. This is the new kind of kidnapping. Don’t pay the
ransom and your data is lost forever. You need an insurance
policy to prevent it.
PATRICK MIRAZON
Owner
Mirazon Group
SEBASTIAN USAMI
Systems Engineer
BEK Inc.
Imagine getting locked out of your computer — not because
you forgot your login credentials, but because of a virus. Now
imagine having to pay cybercriminals a hefty sum to regain
access to all your files, customer data and confidential
business information - no good can come of this.
Ransomware is the currently the most popular, and nefarious,
trend in malicious software. It is deployed with the intention
of blocking access to your file system, and impeding your
ability to do business, by encrypting data until a specified
sum of money is paid to those holding it hostage.
FRANK SLATTERY
General Manager
TeamLogic IT
!
!
!
!
!
!
!
!
!
!
!
!
!
!
DALE SHULMISTA
Business Continuity Specialist
Invenio IT
Ransomware is a type of malware that holds your data hostage
until a demand is met. High profile attacks are making headlines
and as a result, businesses around the world are increasing their
cybersecurity–however, with new strains popping up daily, I’d like
to see businesses consider another approach for protection. . .
intelligent business continuity.
Now that you have the basic jist of ransomware, we regret to inform
you that it comes in multiple forms! That’s right. Malware leads to
ransomware which leads to things like CryptoLocker. As more strains
of ransomware attack SMBs, it’s vital to your business that you protect
your data. Managed services providers are your best line of defense
when it comes to taking down the ransomware threat.
For more on ransomware, check out the eBook, “The Business Guide to
Ransomware”.

More Related Content

What's hot

Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptYash Diwakar
 
Ransomware
Ransomware Ransomware
Ransomware Armor
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and MitigationNoel Waterman
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionMohammad Yahya
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataInderjeet Singh
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attackAmna
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessKaspersky Lab
 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessCalyptix Security
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)phexcom1
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesQuick Heal Technologies Ltd.
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokeshLokesh Bysani
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attackdoiss delhi
 
র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার Titas Sarker
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attacki-engage
 

What's hot (20)

Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
 
Ransomware
Ransomware Ransomware
Ransomware
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and Mitigation
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your Business
 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT business
 
Wannacry
WannacryWannacry
Wannacry
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attack
 
র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 

Similar to What is Ransomware? A Quick Guide

Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up bookDiego Souza
 
Prevent Phishing Attacks – CRI Advantage
Prevent Phishing Attacks – CRI AdvantagePrevent Phishing Attacks – CRI Advantage
Prevent Phishing Attacks – CRI AdvantageCRI Advantage
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWareUmer Saeed
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdfKavitaDubey18
 
Tip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksTip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksKeepnet Labs.
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsProtected Harbor
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOKBoris Loukanov
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?ahanashrin
 
The Most Common Enterprise Malware and how to identify them
The Most Common Enterprise Malware and how to identify themThe Most Common Enterprise Malware and how to identify them
The Most Common Enterprise Malware and how to identify themInstaSafe Technologies
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxInfosectrain3
 
What is ransomware
What is ransomwareWhat is ransomware
What is ransomwarevikash saini
 
Ransomware- What Accountants Need To Know
Ransomware- What Accountants Need To KnowRansomware- What Accountants Need To Know
Ransomware- What Accountants Need To KnowAce Cloud Hosting
 
Information security Services In Mohali .pdf
Information security Services In Mohali .pdfInformation security Services In Mohali .pdf
Information security Services In Mohali .pdfPentagon  Infosec
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?The TNS Group
 

Similar to What is Ransomware? A Quick Guide (20)

What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Prevent Phishing Attacks – CRI Advantage
Prevent Phishing Attacks – CRI AdvantagePrevent Phishing Attacks – CRI Advantage
Prevent Phishing Attacks – CRI Advantage
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
Tip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksTip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacks
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?
 
The Most Common Enterprise Malware and how to identify them
The Most Common Enterprise Malware and how to identify themThe Most Common Enterprise Malware and how to identify them
The Most Common Enterprise Malware and how to identify them
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
What is ransomware
What is ransomwareWhat is ransomware
What is ransomware
 
Ransomware- What Accountants Need To Know
Ransomware- What Accountants Need To KnowRansomware- What Accountants Need To Know
Ransomware- What Accountants Need To Know
 
Information security Services In Mohali .pdf
Information security Services In Mohali .pdfInformation security Services In Mohali .pdf
Information security Services In Mohali .pdf
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?
 
The malware (r)evolution
The malware (r)evolutionThe malware (r)evolution
The malware (r)evolution
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

What is Ransomware? A Quick Guide

  • 2. RANSOMWARE IN ONE IT TOPIC THAT DOESN’T SEEM TO BE LOSING MOMENTUM ANY TIME SOON.. Attacks on various industries are becoming daily occurrences. We hear of companies paying huge sums to retrieve their data from the malicious software. Often, the companies affected aren’t familiar with ransomware until it’s too late. So, allow us to introduce you to the infamous ransomware.
  • 3. Ransomware comes in quite the variety pack these days, but let’s start by cancelling out some definitions. RANSOMWARE IS NOT…
  • 4. ‘Malware’ is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomeware, spyware, adware, scareware, and other maliicious programs. It can take the form of executable code, scripts, active content, and other software. RANSOMWARE ≠ MALWARE
  • 5. RANSOMWARE ≠ RANSOM Ransom is the practice of holding a prisoner or item to extort money or property to secure their release, or it may refer to the sum of money involved. In an early German law, a similar concept was called weregild.
  • 6. While ransomware is a form of malware, it’s definitely unique in what it does. Sprinkle in some ‘ransom’ and you’ve got a malicious virus that keeps your data encrypted until ransom is paid (usually in bitcoins). SO AS AN SMB, WHY SHOULD YOU CARE? THE NUMBERS TELL A DARK TALE!
  • 7. SO WHAT’S THE CURRENT STATE OF RANSOMWARE? There have been more than 700,000 ransomware attempts between 2015-2016. Source: Kaspersky Labs
  • 8. IT’S PRETTY CONTAGIOUS! More ransomware attacks are hitting entire networks. The healthcare industry has recently experienced this. Source: CIO
  • 9. AND IT’S NOT CHEAP TO RECOVER FROM! In 2016 alone, more than £150 million has been paid out by victims. Source: CNN
  • 10. NOT ONLY IS RANSOMWARE BECOMING MORE COMMON, BUT IT’S ALSO EXPENSIVE AND CAN HALT AN ENTIRE SYSTEM. As an SMB, it’s painful to your bottom line. We decided to ask some IT professionals for their thoughts and noticed a common trend… BUSINESS CONTINUITY.
  • 11. WHILE BUSINESS CONTINUITY CAN’T PREVENT RANSOMWARE FROM ATTACKING, IT CAN PREVENT IT FROM SUCCEEDING! When it comes to ransomware, it’s not a matter of IF but WHEN. Business continuity will give you access to your captive data. No hostages here!
  • 12. CODY ARNOLD Backup Engineer Bizco Technologies Ransomware is a threat to your business and your ability to function. Not having a proper backup/disaster recovery solution in place could be crippling.
  • 13. Imagine losing all of your data unless you pay a ransom of hundreds or thousands of dollars in a currency you don’t understand. You may pay the ransom and still not get your data back. This is the new kind of kidnapping. Don’t pay the ransom and your data is lost forever. You need an insurance policy to prevent it. PATRICK MIRAZON Owner Mirazon Group
  • 14. SEBASTIAN USAMI Systems Engineer BEK Inc. Imagine getting locked out of your computer — not because you forgot your login credentials, but because of a virus. Now imagine having to pay cybercriminals a hefty sum to regain access to all your files, customer data and confidential business information - no good can come of this.
  • 15. Ransomware is the currently the most popular, and nefarious, trend in malicious software. It is deployed with the intention of blocking access to your file system, and impeding your ability to do business, by encrypting data until a specified sum of money is paid to those holding it hostage. FRANK SLATTERY General Manager TeamLogic IT ! ! ! ! ! ! ! ! ! ! ! ! ! !
  • 16. DALE SHULMISTA Business Continuity Specialist Invenio IT Ransomware is a type of malware that holds your data hostage until a demand is met. High profile attacks are making headlines and as a result, businesses around the world are increasing their cybersecurity–however, with new strains popping up daily, I’d like to see businesses consider another approach for protection. . . intelligent business continuity.
  • 17. Now that you have the basic jist of ransomware, we regret to inform you that it comes in multiple forms! That’s right. Malware leads to ransomware which leads to things like CryptoLocker. As more strains of ransomware attack SMBs, it’s vital to your business that you protect your data. Managed services providers are your best line of defense when it comes to taking down the ransomware threat. For more on ransomware, check out the eBook, “The Business Guide to Ransomware”.