Follow on Google News News By Tag Industry News News By Place Country(s) Industry News
Follow on Google News | Cyber criminals are hunting down your organizationCyber criminals are hunting down your organization as they use different tools on businesses compared to consumers. Is your business protected from the hunt?
By: 365 iT SOLUTIONS According to Kaspersky Lab (https://www.kaspersky.com/) There has been a greater exploitation of legitimate software programs and malware resulting in a steady rise in the number of corporate users attacked by ransomware. An alarming 58 percent of corporate PCs were hit with at least one attempted malware infection. That is an increase of 3 percent compared to 2014. Over 33 per cent of businesses were exposed to an Internet-based attack and a further 41 percent of business computers faced local security threats such as from infected USB sticks or compromised removable media. Kaspersky Lab reported that in 2015, ransomware crypto locker attacks doubled on more than 50 thousand business systems and companies cannot function if the information on several critical systems is encrypted and inaccessible therefore these affected businesses are more likely to pay the ransom to the cyber criminals. Cyber criminals are hunting down your organization and many organizations such as yourself are falling victim to ransomware crypto locker. When they become a victim, they find themselves faced with a ransom to stop a DDoS-attack or decrypt files on systems that have been exposed. Unfortunately, there has been evidence that those cyber criminals are not honoring the agreement once the ransom is paid and either disappears or ask for more money. Example, Kansas Heart Hospital (http://www.healthcareitnews.com/ Why are cyber criminals are hunting down your organization? Here are 6 simple steps to protect your company from ransomware crypto locker attacks: • Educate your all your employees. • Block ransomware at the perimeter with next generation business class firewalls. • Install up-to-date anti-malware and anti-virus solution. • Limit data access to unnecessary systems and files. • Monitor and manage user activity on the network. • Extremely important, be prepared to restore from backup and test it. 365 iT SOLUTIONS (http://365itsolutions.com/ Cyber criminals are hunting down your organization but our complimentary network and security assessment (http://365itsolutions.com/ End
Account Email Address Account Phone Number Disclaimer Report Abuse
|
|