It’s 4pm on Friday and you receive a call from your assistant Holly.
She has opened an email claiming to be from the Managing Director and now the files on her computer are encrypted and it is displaying a ransom note demanding money to unlock the data.
You have had some basic cyber security training and know this could spread through the entire network – what should you do next?
WHAT IS RANSOMWARE?
Ransomware is a type of malware which prevents users is from accessing their systems or data until a ransom is paid.
Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website and it can be devastating to an individual or an organisation.
Worldwide, ransomware attacks have increased by more than 350% annually, with businesses falling victim to an attack every 14 seconds.
THE FIRST STEP
Immediately isolate the infected computer.
This is done by disconnecting the computer from the network, by either disconnecting it from the Wi-Fi network or by disconnecting the network cable from the computer.
This will prevent the ‘malware’ from spreading to other computers and servers.
Do NOT pay the ransom as there is no guarantee the cybercriminals will give you the files back.
Once the encrypted computers have been isolated, contact a Cybersecurity Specialist / call Holker IT.
All computers will then be isolated to prevent further infection and scanned to identify the scale of the infection.
The data and/or systems can then be restored from offsite back-ups, providing off-site back-ups are in place.
Protection and response are key to avoiding a security breach.
Having up-to-date firewalls and malware protection in place strengthens your defences, however our Total Security packages provide the latest in security technology to keep your business safe from cyber-threats.
Our experienced team are able to provide different levels of security, user training, multi-factor authentication, off-site back-ups and disaster recovery services.
CYBER ESSENTIALS / PLUS
Government-backed scheme ‘Cyber Essentials’ addresses the most common Internet-based threats to cyber security — particularly, attacks that use widely available tools and demand little skill. The scheme considers these threats to be:
Hacking — exploiting known vulnerabilities in Internet-connected devices, using widely available tools and techniques
Phishing — and other ways of tricking users into installing or executing a malicious application
Password discovery — using various methods/tools to discover usernames and passwords
The Cyber Essentials scheme helps organisations to protect the confidentiality, integrity and availability of data stored on devices which connect to the Internet.
Advantages of certification
• Reassure businesses that their systems have been audited and that a strategy is in place to protect against common cyber threats.
• Attract new business by demonstrating that you take cyber security seriously
• Builds a relationship with a trusted IT supplier
• Certain local & national government contracts require Cyber Essentials certification
CYBER SECURITY WEBINAR
Sign up for our free 30-minute Cyber Security webinar on Friday 14th February 2020 (11.00 – 11:30) for advice on how best to protect your business from the threats of Cyber Crime.
Click here to sign up by simply filling in your name and company.
For more information please contact Martin Brelsford on either 01282 859806 or firstname.lastname@example.org