In-depth

How can you protect your business from crypto-ransomware?

Here are some easy-to-apply rules to help keep your data - and your business operations - safe

Crypto-ransomware, also known as cryptors, is a specific type of ransomware where the files and data that are stored on the infected device are encrypted into an unreadable form. This means the data can only be decrypted by using the necessary decryption key, which is only released by the criminal after the victim has paid the ransom demand.

Consumers affected by crypto-ransomware are usually faced with demands of 250 to 500, but ransom charges for businesses can be much higher as cybercriminals understand just how valuable data can be. If the ransom goes unpaid, the price will steadily increase until the decryption key is deleted, making it virtually impossible to recover the files. But even if a ransom is paid, there's no guarantee the data will be decrypted.

A recent report from Chubb has revealed that ransomware attacks for 2019 have already outpaced the total number of incidents in 2018. Although any company can be affected by ransomware, professional and financial services are a particularly attractive target. 

"Some ransom demands have grown to the six- and seven-figure range," said Michael Tanenbaum, Head of Chubb Cyber North America. "It is critical for businesses to understand the increased sophistication of ransomware, what procedures and systems need to be in place to mitigate the risk, and what solutions they need to protect themselves should they experience an attack."

Advertisement
Advertisement - Article continues below

A temporary loss of data can disrupt business-critical processes, and could lead to lost sales, reduced productivity and significant costs for system recovery. However, the permanent loss of data can have much more severe consequences, from damaging the company's competitive position to preventing access to intellectual property and design data.

In common with most other types of malware, there are many ways in which a cryptor can find its way onto business computers and other devices. Here are some easy-to-apply rules to help keep your data - and your business operations - safe.

Educate users:

People are often the most vulnerable element in any business. Teach employees about IT security basics, including raising awareness of phishing and spear-phishing attacks. Emphasise the security implications of opening suspicious-looking email attachments, even if it appears to be from a trusted source.

Security awareness training programmes can be a good way of ensuring employees are aware of the latest threats, and to keep security front-of-mind for staff.

Related Resource

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now

Regularly back up data:

The best way to keep business data safe is by backing up systems regularly. With a good backup system, a ransomware attack won't have a catastrophic effect on business continuity.

Almost all businesses will already have data back up policies. However, it's also essential to back up data onto an offline backup system, rather than just copying files to another live' system on a corporate network. Establishing a back up and disconnect' policy will help keep backup files safe from cryptors.

Protect all devices and systems:

Cryptors don't just attack PCs. Business security software must also be able to protect Mac computers, virtual machines and mobile devices. It is also worth ensuring there is sufficient protection installed on the organisation's email system.

Advertisement
Advertisement - Article continues below

But as well as protecting devices and internal systems, it's also important to make sure that third-party applications are updated as well. Hackers can easily leverage a vulnerability in a popular application to breach your network and start infiltrating other systems.

Deploy and maintain security software:

As with all malware prevention, updating and patching early and often is a valuable policy to follow. Updating all applications and operating systems will allow elimination of newly discovered vulnerabilities, and ensuring security applications and anti-malware databases are up-to-date will enable the business to benefit from the latest protection.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/security/ransomware/28070/best-ransomware-removal-tools
Security

Best ransomware removal tools

7 Dec 2018
Visit/government-it-strategy/28305/ir35-news
Policy & legislation

Businesses urged to continue IR35 preparations despite Conservative review pledge

3 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/business/business-strategy/354252/huawei-takes-the-us-trade-sanctions-into-its-own-hands
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
Visit/mobile/mobile-phones/354273/pablo-escobars-brother-launches-budget-foldable-phone
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019