In our last article, we described the recent situation with many organizations were hit by the WannaCry strain of ransomware – and the possible ways of retaliation. In some cases, organizations simply chose to pay the ransom of $300 – a mere pittance compared to the value of lost data. But WannaCry was not ransomware targeting businesses; instead, it was focused on impacting individuals. Thus, the extremely low ransom. In many ways, organizations hit by WannaCry were lucky.
But the next ransomware variant may not be so nice.
Secure information infrastructure is a crucial component for the success of modern business. Previously, we have considered general ways of protecting against ransomware and how to proactively defend data with backups.
However, there is more obvious way of protection.
In this article, we consider offers for Managed Service Provider (MSP) from antivirus companies and discuss most valuable criteria in choosing complex anti-virus solution. Continue reading
If you turned on the news or read anything on the web last week, you’re keenly aware of the ransomware known as WannaCry. By the numbers, it is by far the most pervasive ransomware strain to date – 150 countries, over 200K infections, and encryption of nearly 200 file types. Its use of the NSA’s ETERNAL BLUE exploit made WannaCry even more dangerous, as the exploit allowed it to easily move laterally from one machine to another within a network.
And while the ransom was light – in comparison to other ransomware variants hitting organizations – it’s model of an escalating ransom (first $300, $600 after 3 days, and then no decryption possible after 7 days) over a short period of time created the urgency its designers wanted. Continue reading