Tech Force
  • Home
  • I.T. Support
  • Managed Services
  • Cloud Solutions
  • Blog
  • Contact Us

Tech Bits & Bytes Blog

Ransomware Exposed: What it is and How it Works

7/23/2017

Comments

 
Picture
Ransomware has become an undeniable threat to business growth, profitability and security. It’s a ruthless type of malware that locks your keyboard or computer to prevent you from accessing your data until you pay the ransom, which is usually demanded in untraceable Bitcoin. Cyber criminals are turning this type of attack into big business, raking in billions each year as many businesses have no choice but to pay up.

How does ransomware get into the network?
Surprisingly, it’s NOT those random USB drives floating around from unknown sources. That’s old school, and cyber criminals operate much more effectively now. The most common vehicle for ransomware attacks today are email and compromised websites.

One email is all it takes.
We’ve all become so used to email as the major form of business communication that getting someone to click a link is easier than ABC. Ransomware attacks come disguised as legitimate emails that can trick your employees into clicking through to an infected website or opening an infected attachment. Unfortunately, cyber criminals have gotten really, REALLY good at faking internal emails, external communications from stakeholders and seemingly genuine inquiries from customers. They’ll often conceal their ransomware in normal attachments like invoices and reports in Office docs as well as PDFs. Even TXT files can actually be an executable javascript in disguise!

Infected websites aren’t always obvious.
Let’s face it, cyber criminals will infect any web page they can get their hands on, which is why of the less reputable sites should be avoided. But it’s not just about making sure you and your employees stick to suitable sites, mainstream websites can also carry ransomware infections ready to spread to all visitors. It’s happened before – in 2016 the New York Times, BBC & MSN homepages accidentally exposed thousands of web visitors when their infected site showed malicious ads.

What happens during an attack?
As soon as ransomware is in the door, it immediately scans local and connected drives (including connected backups) and encrypts thousands of files. Within minutes, everything from Office files to multimedia is locked up tight, inaccessible to all users – even admin. Then a notification appears demanding a ransom to unlock the files and gives helpful instructions on how to pay it. At this point, many businesses are on hold until the situation can be resolved. Typical options include: restoring from safe, external backups; wiping the entire system and starting again; or paying the ransom and learning a hard lesson in data security. Ransomware may not be fun, but it certainly makes for an interesting day at the office!

We can help you with a complete data security plan, including safe backups. Call us today at 262-515-9499.
Comments

    Tech Force Blog

    We provide you with  important, practical tips and insight for your technology and networks for both home and business.

      Contact Us for Help!

    Submit Request

    Archives

    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    July 2017
    April 2017
    February 2017
    January 2017
    December 2016
    November 2016

    Categories

    All
    Business Continuity
    Business IT
    Cloud Computing
    Cyber Security
    Networking
    Tech Talk

    RSS Feed

Get in touch with us!

p.   (262) 515-9499
e.   support@techforceonline.com

Office Hours:
Monday - Friday:  9am - 5pm

Contact Us Today!
Remote Support
Residential Online Backup

Picture

See what our clients have to say...

Very pleased with Tech Force!  We've been using Tech Force for over four years now.  We've had a lot of different people do computer and IT stuff for us, but Tech Force is the first to come in and implement a plan.  The plan was executed and we've had no problems.

Tech Force is very good at getting back to you when you have a problem. You don't have to wait and wait for things to get done. If they can't take care of the problem remotely, they will come over here. They always send somebody who is skilled and knows how to take care of the problem, unlike the companies we've used in the past. We've been very pleased with Tech Force!  ~ Ed V., Advanced Spine & Sport

More Client Reviews

Read Our Customer Reviews


We service Racine, Mount Pleasant, Sturtevant, Wind Point, Union Grove, Elmwood Park, Franksville, Caledonia, Kenosha, Somers, Pleasant Prairie, Bristol, Parkside, Oak Creek and Franklin, WI and surrounding areas. Copyright © 2009-2020 Tech Force Computer Service, LLC.
  • Home
  • I.T. Support
  • Managed Services
  • Cloud Solutions
  • Blog
  • Contact Us