Don't be held to Ransom!
It’s 4pm on a Friday and you receive a call from your assistant Holly.
She has opened an email claiming to be from the Managing Director and now her computer is encrypted and is displaying a ransom note demanding money to release the data.
You have had some basic cyber security training and know this could spread through the whole network – what should you do next?
The Next Step...
Ransomware is a type of malicious software designed to deny access to a computer system or data until a ransom is paid.
Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website and can be devastating to an individual or an organization.
Worldwide, ransomware attacks are growing more than 350 percent annually, with businesses falling victim to an attack every 14 seconds.
Immediately isolate the encrypted machine. This is done by disconnecting the machine from the network, whether that be disconnecting from the WiFi or physically pulling the network cable out of the machine.
This contains the ‘virus’ and stops it spreading around the network to other machines and servers.
Do not pay the ransom – this is an absolute last resort.
Once the encrypted machine is isolated, speak to a cyber specialist / call Holker IT. We will isolate each machine on the network to stop any further infection.
We can then restore the encrypted data from back-ups, providing off-site back-up is in place.
Protection and response are key to avoiding a security breach.
Having up-to-date firewalls and antivirus in place strengthens your defence, however our total security packages provide the latest in security technology to keep your business safe from attacks.
Our experienced team provides different levels of security, user training, multi-factor authentication, off-site back-up and disaster recovery.
Government-backed scheme ‘Cyber Essentials’ addresses the most common Internet-based threats to cyber security — particularly, attacks that use widely available tools and demand little skill. The scheme considers these threats to be:
Hacking — exploiting known vulnerabilities in Internet-connected devices, using widely available tools and techniques
Phishing — and other ways of tricking users into installing or executing a malicious application
Password guessing — manual or automated attempts to log on from the Internet, by guessing passwords
The Cyber Essentials scheme helps organisations to protect the confidentiality, integrity and availability of data stored on devices which connect to the Internet.
Advantages of certification
Reassure customers that you are working to secure your IT and their data against cyber attack
Attract new business with the promise you take cyber security seriously
Build a relationship with a trusted IT supplier
Certain local & national government contracts require Cyber Essentials certification
Sign up for our free 30-minute Cyber Security webinar on ……. January for advice on how best to protect your business from the threats of Cyber Crime.
For more information please contact Martin Brelsford on either 01282 859806 or email@example.com