Ransomware, That’s Why…
Technological robbery is reaching new epic proportions as unsuspecting users fall prey to ever more elaborate heists. For small business, what used to be the occasional problematic viruses, password stealing, and remote PC attacks is now full blown extortion.
We’re committed to do our part in protecting business and users. We now offer top notch online user safety training and testing suitable for businesses, as well as a comprehensive backup review. Even better; for the month of June, we’ve secured a deal that is only $19 per user per year with no minimum requirements. Normally these programs are structured to start at 25 users at $29.25.
These are the numbers!
Since the beginning of 2016 malicious email has risen 66% from the last quarter of 2015, and more than 800% since the beginning of 2015. This includes phishing, ransomware, spam, malware emails, phone calls, and social medias attacks designed to dupe users into exposing and putting critical data at enormous risk.
1. Survey says 80% of phishing emails are not caught by spam filters
2. Each case of Locky is reportedly uniquely different; consequently, detection by a traditional antivirus and spam filter products is nearly impossible
3. 91% of successful data breaches started with a spear-phishing attack
4. Average ransomware cost is $500, but have been known to go as high as several thousand dollars to get your data back.
5. Forbes claims that Locky ransomware is infecting approximately 90,000 systems per day (over 1 per second)
6. We are seeing 3 and 4 businesses a day needing rescued from the result of an attack.
Without user training small and medium business should prepare for the possibility that they could get repeatedly infected by different users and different ransomwares. It’s been reported that some businesses have been hit by two different ransomwares at the same time, and couldn’t respond to the demands because the encryption “scrambled” the directions.
The Impact on Your Business:
1. Data loss & Business disruption
34% of companies do not test their backups and of those tested 77% found that tape backups failed to restore
According to Microsoft, 42% of attempted recoveries from tape backups in the past year have failed
2. Protect business reputation
How would you feel reading about a data breach on the front page of the morning newspaper? Just think about the direct and indirect cost of having to deal with a security incident: customers, suppliers, and stakeholders. Difficult to quantify but significant.
3. Stolen banking and/or customer information
Personal accounts are insured, but business accounts are not. If cyber thieves hack into your network, take over your bank account, and transfer money out of the country, you are NOT INSURED.
Security Awareness Training
A good first step is to start educating your employees. Training will allow them to recognize and report suspicious emails, websites, and calls. As a business owner, a good program will have the following.
- Affordable & easy to manage
- Minimal employee productivity disruption (ie. training is split into modules that can be done over short periods of time)
- Not just training, but continuous improvement through testing
- Specializes in making sure employees understand the mechanisms of spam, phishing, spear- phishing, malware and social engineering; and are able to apply this knowledge in their day-to-day job
- A Ransomware Guarantee
How our program works:
- Perform a baseline test to see how Phish-prone your employees actually are.
- Training for employees and managers on how to spot a security concern.
- Send simulated phishing attacks to employees to reinforce the training.
- Train your users to prevent ransomware like CryptoLocker, Locky, and more.
Your backup is the last line of defense for your data.
In the event of a data encryption malware, removing the existing data source and restoring from an un-corrupted backup is the only way to truly make sure the data cannot be re-encrypted. Often times you need to go several versions back to get clean copy. This could mean days of work gone and manual re-entry from paper. Even data stored in the “cloud” is not safe from these data encryption hostage takers.
Schedule a backup review; we’ll examine your current backup. With this information you’ll know:
- Could you recover from an attack.
- How long it would take to recover.
- What data is at risk
- What steps you can take to get safe.