Don't be held to Ransom!

It’s 4pm on a Friday and you receive a call from your assistant Holly.

She has opened an email claiming to be from the Managing Director and now her computer is encrypted and is displaying a ransom note demanding money to release the data.

You have had some basic cyber security training and know this could spread through the whole network – what should you do next?

The Next Step...

What is Ransomware?

Ransomware is a type of malicious software designed to deny access to a computer system or data until a ransom is paid.

Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website and can be devastating to an individual or an organization.

Worldwide, ransomware attacks are growing more than 350 percent annually, with businesses falling victim to an attack every 14 seconds.

The First Step

Immediately isolate the encrypted machine. This is done by disconnecting the machine from the network, whether that be disconnecting from the WiFi or physically pulling the network cable out of the machine.

This contains the ‘virus’ and stops it spreading around the network to other machines and servers.

Do not pay the ransom – this is an absolute last resort.

Once the encrypted machine is isolated, speak to a cyber specialist / call Holker IT. We will isolate each machine on the network to stop any further infection.

We can then restore the encrypted data from back-ups, providing off-site back-up is in place.


Protection and response are key to avoiding a security breach.

Having up-to-date firewalls and antivirus in place strengthens your defence, however our total security packages provide the latest in security technology to keep your business safe from attacks.

Our experienced team provides different levels of security, user training, multi-factor authentication, off-site back-up and disaster recovery.

Cyber Essentials / Plus

Government-backed scheme ‘Cyber Essentials’ addresses the most common Internet-based threats to cyber security — particularly, attacks that use widely available tools and demand little skill. The scheme considers these threats to be:

Hacking — exploiting known vulnerabilities in Internet-connected devices, using widely available tools and techniques

Phishing — and other ways of tricking users into installing or executing a malicious application

Password guessing — manual or automated attempts to log on from the Internet, by guessing passwords

The Cyber Essentials scheme helps organisations to protect the confidentiality, integrity and availability of data stored on devices which connect to the Internet.

Advantages of certification

Reassure customers that you are working to secure your IT and their data against cyber attack

Attract new business with the promise you take cyber security seriously

Build a relationship with a trusted IT supplier

Certain local & national government contracts require Cyber Essentials certification

Cyber Security Webinar

Sign up for our free 30-minute Cyber Security webinar on ……. January for advice on how best to protect your business from the threats of Cyber Crime.

For more information please contact Martin Brelsford on either 01282 859806 or