Some cyber security experts call ransomware attacks an epidemic.
In 2016, the FBI estimated that ransomware attacks resulted in over $1 billion in income for cybercriminals*. Experts attribute the ransomware epidemic to people’s carelessness in clicking on phishing emails and infected advertisements.
Here are 10 things organisations should know about ransomware:
- Ransomware was first reported in 1989
- Ransomware doesn’t discriminate when it comes to platforms and devices
- Ransomware can be distributed through various channels
- Ransomware often goes undetected
- Organisations should change their mindset from a reactive-based model to a prevention-oriented one
- Organisations should develop a prevention and response plan
- Organisations should identify a prevention and response team
- Organisations should perform a compromise assessment
- Organisations should complete a security tools assessment
- Organisations should respond and future-proof
Download the full infographic here – Infographic courtesy of Cylance Consulting
As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. Businesses need to be aware of the risks and take adequate precautions to minimize the impact in the event of an attack.
See Cylance in action for yourself? Register here to join our workshop at The Metal Box Factory in London on the 25th May and see the capabilities for yourself.
We saw an unprecedented number of high profile cyber-attacks and malware infections reported in 2014 – Target, Snapchat, eBay and Adobe (to name a few). This has brought cyber security much more into focus, not only for c-level executives and cyber security analysts, but also for world leaders. The complexity of these attacks and the frequency that we saw in 2014, begs the question what does 2015 hold?
In this whitepaper our security experts look behind the attacks and highlight the key elements that malware, advanced persistent threats (APT) and other cyber-attacks typically use to infiltrate networks and how businesses like yours, can protect their valuable assets and data.
Download it here
Trusteer Apex applies a new approach to stop advanced zero-day threats from compromising employee endpoints, without impacting the user and with minimal IT overhead. Take a look at our latest webinar for a live and compelling demo of Trusteer Apex. It’s well worth a view and will make you think twice before clicking that next email link!
We are all hearing more and more about the frequency and evolution of malware. In this video bog we discuss the different kinds of threats your organisation may face and a new solution to stop zero-day exploits and data exfiltration. Trusteer Apex can automatically and accurately determine if an application action is legitimate or malicious. A must see video blog for an overview of a new approach to protect enterprise endpoints.
By Vanessa Cardwell, Marketing Manager, Netutils
Views expressed in this post are original thoughts posted by Vanessa Cardwell, Marketing Manager, Netutils. These views are her own and in no way do they represent the views of the company.
Given the increase in frequency and evolution of malware threats in recent months we thought you’d be interested in taking a look at this thought provoking infographic from our partners Trusteer detailing the 5 most dangerous malware trends for 2014. The infographic gives an explanation of the threat and the danger. You can check out the full blog post on the Trusteer website here or view the infographic below which lists the 5 threats in 2014 as:
- Source code leaks will accelerate malware release cycles
Mobile SMS forwarding malware will become ubiquitous
Old school malware techniques will make a comeback
- Account takeover will move to victims device
- Malware research evasion will become more popular
Malware Trends 2014 Infographic Final