Cyber Protection Group – Penetration Testing Company
Penetration Testing, Incident Response, PCI Assessments #cybersecurity #infosec #itsecurity
814.799.0274
  • Penetration Testing
  • Business Technology Services
  • Computer Support Services
    • Home Computer Repair
    • Business Computer Repair
    • Remote Support
  • About
  • Contact Us

    Ransomware: The Basics

    July 5, 2019
    ransomware

    Ransomware

    Within the past month, countless city governments, corporations and individuals have fallen victim to a ransomware attack.

    For example, three city governments in Florida are dealing with ransomware attacks currently. 

    Along with being attacked and losing their data, they are paying hundreds of thousands of dollars to get it back because they did not properly prepare for such an event. 

    Continuing, in order to get a better understanding of how anything can be vulnerable to this type of attack, let us break down exactly what ransomware is.

     

    What is Ransomware?

    By definition, ransomware is, “malware planted illegally in a computer or mobile device that disables its operation or access to its data until the owner or operator pays to regain control or access”. 

    Further, the basic breakdown of this definition is that a threat actor accesses your computer and or files, locks it down and to get it back, you must pay the ransom requested. 

    To many organizations and individuals, this can seem overwhelming and scary, and it should. Many think that they are not at risk for such an attack, but ransomware can attack any one. 

    Now, before panic ensues, several measures to prevent having to shell out your hard-earned cash to a threat actor can be put in place

     

    How to Prepare Against a Ransomware Attack

    As a professional in the cyber security field, I personally cannot put enough emphasis on backing up files. This is the number one most important step to protect yourself, organization or government body from falling victim.

    The reason ransomware attacks are so detrimental to a business, for example, is because said business does not have their data backed up, and loses access to it in an attack. In order to recover what they lost, they negotiate a price with the malicious user. 

    Also, employees and lack of education on the matter pose a threat to a business or household regarding ransomware.

    To elaborate, all three of the ransomware attacks in Florida in the last month were due to employees clicking malicious links they received in their email.

    This allowed the ransomware / malware into the government network, thus allowing a malicious user in. 

    As a preventative measure, companies should be putting together training programs surrounding security risks such as employee negligence to facetious email and links. 

    One example could be reporting any suspicious looking emails to the IT department for review. This extra few seconds could make a difference of millions of dollars. 

    All in all, educating employees, yourself and those around you can help make a difference in preventing a ransomware attack. Even reading this article can help to educate and create awareness to ransomware attacks!

     

    What Happens after an Attack?

    The downside of all of this is that sometimes no matter what you do, malicious users find a way into your systems one way or another. 

    In the event that your machine becomes encrypted by ransomware, here’s a few recommendations. 

    –

    Before I get into the recommendations, as a general disclaimer, every ransomware attack is unique to the target it attacks. One overall blanket statement does not fit for every situation.

    This article is meant to be informative and create awareness to this type of cyber attack. 

    If you happen to become a victim to ransomware, contact your company’s IT department or take your machine to a trusted computer repair service. 

    –

    Now, let’s take a look at what do during a ransomware attack. 

    To begin, if you have your data backed up, you have a good chance of restoring your device. In this case a fresh load of, for example, of Windows may be recommended. You are now able to regain control of your data without paying for it. If you are not backed up, and even if you are, having a professional look at your device is the best option. 

    The company I work for, Cyber Protection Group, has dealt with ransomware infected machines before and has been able to successfully remove the ransomware and restored the machine. 

    CPG is a great option to keep in mind if you ever find yourself in this position. (for questions regarding CPG services, please contact us here)

    On a larger scale, I have seen governments pay the ransom to get their data back. Doing this sets a precedent for cyber criminals that companies and governments will do anything to get their data back. This becomes a payday for the cyber criminal and a company’s worst nightmare. Again, larger entities facing an attack should always consult with cyber security professionals.

     

    Take Away

    To conclude, the main takeaway from this article is that the best way to keep your data safe from a ransomware attack is to back it up. If you only take one idea away from this article…

    BACKUP YOUR FILES!

    Educate employees, take caution when opening suspicious emails and ask your employer and/or government officials about cyber security measures for your work, state and country!

     

    By Taylor Ritchey 

    Post navigation

    Technology Accessories Under $50
    DNA Testing Kits and Privacy Concerns

    Free Sample Penetration Testing Report

    Click here to download your free penetration testing report!

    Recent Stories

    • Appalachia Technologies Acquires Cyber Protection Group February 16, 2022
    • United States Improves Critical Infrastructure Security May 19, 2021
    • Hacking Group Stops Oil Pipeline and Breaks 45% of the United States Oil Supply May 10, 2021
    • What is Penetration Testing and Why Do You Need It? May 10, 2021
    • Quick! Update Your iPhone and iPad! May 3, 2021

    Cyber Protection Group Follow 4,516 2,533

    A recognized Cyber Security firm that specializes in penetration testing, #infosec news, and helping you find vulnerabilities before the bad guys do.

    cyberprotectgrp
    cyberprotectgrp avatar; Cyber Protection Group @cyberprotectgrp ·
    14 Sep 2021 1437810036269465602

    If you are thinking about getting into Cyber Security, I will be speaking to the Women in Cybersecurity Student Chapter at the University of Windsor about this great field. Topics will include getting into the field and what to expect. I will be taking…

    Image for twitter card

    Mike Miller on LinkedIn: #cybersecurity #infosec

    If you are thinking about getting into Cyber Security, I will be speaking to the Women in Cybersecurity Student ...

    lnkd.in

    Reply on Twitter 1437810036269465602 Retweet on Twitter 1437810036269465602 1 Like on Twitter 1437810036269465602 1 Twitter 1437810036269465602
    cyberprotectgrp avatar; Cyber Protection Group @cyberprotectgrp ·
    13 Sep 2021 1437524891398512651

    Is this not the end of every Teams / Zoom meeting? Agree? #infosec #cybersecurity

    Image for twitter card

    Mike Miller on LinkedIn: #infosec #cybersecurity

    Is this not the end of every Teams / Zoom meeting? Agree? #infosec #cybersecurity...

    lnkd.in

    Reply on Twitter 1437524891398512651 Retweet on Twitter 1437524891398512651 1 Like on Twitter 1437524891398512651 0 Twitter 1437524891398512651
    cyberprotectgrp avatar; Cyber Protection Group @cyberprotectgrp ·
    7 Sep 2021 1435314214294392836

    How do you handle Kids / Dogs / Cats coming on your screen when you are in a Zoom or Teams meeting? Do you say you are sorry for them interrupting or are you confident in the fact that you have a "real life" at your #workfromhome job? I am finding that…

    Image for twitter card

    Mike Miller on LinkedIn: #workfromhome #cybersecurity #infosecjobs

    How do you handle Kids / Dogs / Cats coming on your screen when you are in a Zoom or Teams meeting? Do ...

    lnkd.in

    Reply on Twitter 1435314214294392836 Retweet on Twitter 1435314214294392836 0 Like on Twitter 1435314214294392836 1 Twitter 1435314214294392836
    Load More...

    WE'RE SOCIAL!

    Recent News
    • Appalachia Technologies Acquires Cyber Protection Group
    • United States Improves Critical Infrastructure Security
    • Hacking Group Stops Oil Pipeline and Breaks 45% of the United States Oil Supply
    • What is Penetration Testing and Why Do You Need It?
    • Quick! Update Your iPhone and iPad!
    Pages
    • Blog
    • Penetration Testing
    • Security Vulnerabilities
    • Computer Support Services
    • About
    • Contact Us
    • Application and Website Security Testing
    • Wireless Penetration Testing
    • Top Penetration Testing Company at a Low Cost
    • Home Computer Repair
    • Home
    • Business Technology Services
    • Offering Vulnerability Assessments / Penetration Testing for only $3,950
    • Remote Support
    • Sample Penetration Testing Report

    Contact Us

     
    2230 Woodbury Pike, Ste. 1
    Loysburg, PA  16659
    814.799.0274