Cloud Migration Service Providers

  • BIG Data & Analytics
  • CLOUD
  • Data Center
  • IOT
  • Machine Learning & AI
  • SECURITY
  • Server
  • BlockChain
  • Virtualization
You are here: Home / Data Center / Cisco: Ransomware – What it is, how to avoid it and what to do if it gets you

Cisco: Ransomware – What it is, how to avoid it and what to do if it gets you

November 1, 2017 by cbn Leave a Comment

Ransomware has been all over the news since 2015. You’d think we would all know how to deal with it and the fad would be dying by now.  Well, that’s what I would think.  It turns out that ransomware generates a lot of cash for criminals, an estimated $1 billion in 2016.  It also has a low cost structure (so, very profitable) and the victim directly sends the perpetrator money.

What is ransomware?

In short, ransomware is malware that prevents you from accessing data on your PC.  This either by encrypting as much of your personal data on your PC as it can find or by locking your screen.  Then it issues a demand for ransom to you – give the bad guys money and they will let you access your data.  Most commonly, ransomware infects your PC when you click a link in an infected e-mail. For more details, let’s go to the experts.  The Cisco 2016 Midyear Cybersecurity Report and a detailed study from Talos give a good analysis of ransomware and trends and directions we can expect from crimeware operators pushing ransomware.   For a nice infographic summary of the problem, check here.  Cyber security specialists should read it, although I suggest everyone have a look at the executive summary at the least.

A Ponemon survey of companies who were affected by malware includes cautionary facts for those who might be thinking they will just pay the ransom and go on.  Most of the companies who paid, paid over $1,000 per PC to recover their data.  But only 55% of the companies that paid the ransom received the decryption keys to get their data back.  The cheapest ways out of a ransomware attack are: try hard to avoid the social engineering tricks (don’t let it happen) and keep backups of data you value. Please don’t pay the ransom.

How does it spread?

Speaking broadly, the most common method of spreading ransomware is by social engineering.  Social engineering works by tricking you into infecting your own computer by falling for a trick the malware author tries to play on.  This is usually by e-mail, but it could be a malicious ad on a web page or a malicious web page.  The trick is usually some enticement to click on an attachment or a link to a document, picture or video.  Microsoft Office files, PDFs and multimedia files can all be the carriers for the ransomware program.  Once you click, the ransomware finds your files on the computer and encrypts them.  Then it demands a ransom if you want them back.

Read the entire article here, Ransomware – What it is, how to avoid it and what to do if it gets you

Via the fine folks at Cisco Systems.

Share this:

Share on FacebookShare on TwitterShare on LinkedinShare on Pinterest

Filed Under: Data Center, SECURITY

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • March 2016
  • October 2014

Recent Posts

  • Companies’ Reliance on IT Managed Services Increases in 2023, Sector Valued at US$472 Billion Globally
  • Tailscale, Mullvad partner to deliver secure, private web browsing
  • IBM service uses DNS to deliver multicloud connectivity
  • DNS security poses problems for enterprise IT
  • Cover-ups still the norm in the wake of a cyber incident

Recent Comments

  • Purefit Keto Reviews on Are PDUs Your Best Platform for DCIM Instrumentation?
  • https://gemcr.org/ on 10 Things You Should Know About Deep Learning

Categories

  • BIG Data & Analytics
  • BlockChain
  • CLOUD
  • Data Center
  • IOT
  • Machine Learning & AI
  • SECURITY
  • Server
  • Uncategorized
  • Virtualization

Categories

  • BIG Data & Analytics (2,150)
  • BlockChain (487)
  • CLOUD (3,258)
  • Data Center (649)
  • IOT (2,467)
  • Machine Learning & AI (88)
  • SECURITY (1,669)
  • Server (4)
  • Uncategorized (2,012)
  • Virtualization (342)

Subscribe Our Newsletter

 Subscribing I accept the privacy rules of this site

Copyright © 2023 · News Pro Theme on Genesis Framework · WordPress · Log in