4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ransomware: The Smaller The Business, The Bigger The Problem

Ransomware: The Smaller The Business, The Bigger The Problem

The variety of malware known as ransomware exploded in popularity in 2016, encrypting victims’ files and demanding cryptocurrency payments to restore the data to the estimated tune of $1 billion. This may seem to suggest that large corporations and companies are the primary targets of these cyber criminals--and for some, they are.

However, many small and medium-sized businesses were also victimized by ransomware attacks, often under the mistaken impression that they were too small to be considered worthwhile targets by the perpetrators. Unfortunately for many of these small businesses, this impression ends up costing them big when ransomware strikes.

Ransomware works by encrypting the data stored on a device, demanding that the victim pay a sum in cryptocurrency for their files to be decrypted. This is usually paired with a time-sensitive threat to delete the data if the ransom isn’t paid post-haste.

When attacking large corporations, cybercriminals go for the gold, trying to extort as much as they can from their victim. With small businesses, on the other hand, they take advantage of the common inability many have to afford the solutions that would protect them against such attacks, and ask for a smaller ransom. Considering the relatively high costs many solutions have for a small business, combined with these smaller, more “reasonable” ransoms--plus how much damage even the smallest amount of downtime can cause these businesses--it should come as no surprise that many small businesses see themselves as having no choice but to pay up.

This is problematic for a few reasons.

First, paying the ransom inherently requires entrusting the ones who attacked you to remain true to their word and actually unlock your systems once the funds have changed hands. Are you willing to assume that your attacker is a trustworthy person after they’ve threatened your business?

Second, consider what effect a successful heist against an SMB would have on the cyber criminal. They would naturally be inclined to target more SMBs, possibly returning again to those who proved willing to pay up with a new attack.

Think about it--which would you choose: a possible large payday, or a lot of almost-guaranteed smaller payoffs that quickly add up?

Regardless, it is always better to avoid paying the demanded ransom and to instead rely on proactive measures, such as an off-site (or ideally cloud-based) data backup solution that you can restore your systems with that has been kept safely away from the ransomware.

You also need to make sure your staff is well-versed in recognizing ransomware attacks in order to better avoid them, and what to do and who to contact if their workstation contracts one.

If your SMB needs help protecting itself against the threat of ransomware, reach out to 4IT for assistance. We can advise you on best practices to keep ransomware out of your systems. Give us a call at 305-278-7100 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet software Business Computing Business Management Hackers Backup Productivity Hosted Solutions Malware Managed Service Provider Google IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Hardware VoIP Business Continuity Network Security Workplace Tips Mobile Devices User Tips Computer Saving Money Mobile Device Management Windows 10 Miscellaneous Virtualization Upgrade Data Email Server communications Alert Mobile Computing Small Business Network Save Money Microsoft Office Communication Apps Smartphone Social Media Managed IT Services Outsourced IT Smartphones Quick Tips Browser Productivity Information Technology BYOD Going Green Mobile Office Office Gadgets Health Holiday Cybercrime Android Managed IT Operating System Cybersecurity Chrome Application Ransomware WiFi Data Backup Passwords Best Practice Firewall Disaster The Internet of Things Avoiding Downtime Mobility Risk Management Tablet IT Solutions Telephone Systems Data Recovery History Spam Automation BDR Internet of Things Search Collaboration Data Management Remote Computing Unified Threat Management Employer-Employee Relationship Budget Hard Drives Remote Monitoring Saving Time User Error Apple Hacking Vendor Management Marketing Wireless Technology VPN Phishing Facebook iPhone Content Filtering Customer Relationship Management Money Maintenance Phone System Recovery Proactive IT Office Tips Data Security Law Enforcement Password Office 365 Hosted Solution Computers Big Data Vulnerability Wearable Technology USB PowerPoint Analytics Encryption Gmail Router Virus Google Drive Government App Two-factor Authentication Intranet Lithium-ion battery Antivirus Bring Your Own Device Shortcut OneNote Work/Life Balance Social Current Events Social Engineering IT Support Humor Administration Telephony Printer Tech Support Private Cloud Outlook Wireless Unsupported Software Cloud Computing Users Data Breach Cost Management Windows 8 Save Time SaaS Excel Audit Identity Theft Data Protection Bandwidth HaaS Printer Server Flexibility Laptop Business Intelligence Retail Point of Sale Education Trending IT COnsultant Net Neutrality Computer Repair Windows 10 Politics Personal Information Paperless Office HIPAA Entertainment Benefits Data Loss Computer Care Battery Robot DDoS Fax Server Computer Accessories Managed IT Services Social Networking Google Docs Automobile Workplace End of Support Redundancy Mouse Data Storage Compliance Streaming Media eWaste Uninterrupted Power Supply Legal Internet Exlporer online currency Managing Stress Solid State Drive Sports Travel Efficency Cortana Network Congestion Update Customer Service Biometrics Samsung Project Management Help Desk Wi-Fi Emergency Artificial Intelligence Virtual Reality Networking Meetings Applications Display Blockchain hacker Commerce Instant Messaging Augmented Reality Emails Transportation Conferencing Lifestyle Experience Keyboard Avoid Downtime Microsoft Word Ebay Bloatware Sync iOS IoT Computing Gifts Managed IT Service Music Hiring/Firing Device Security Adobe Branding Computer Fan Hard Drive Data storage Distributed Denial of Service Books Smart Technology Video Games Devices Licensing Microsoft Excel Uograde WIndows 7 Dark Web Images Document Management Advertising Credit Cards Storage Screen Mirroring Inbound Marketing Sales Regulations Spyware Twitter File Sharing Mobile Device Touchpad FAQ Cast Surge Protector Value Managed Security Television Cameras Windows 10s Scam Fraud 3D Printing systems User Nanotechnology Charger Science Presentation Hard Disk Drive Employer Employee Relationship Wiring Edge Virtual Desktop Tablets Operating Sysytem Bluetooth hack Information Best Available Root Cause Analysis Worker Commute PDF ISP IT Technicians Wireless Charging HBO NFL Debate best practices Scalability Files Ciminal SharePoint CrashOverride IT Budget Safety Text Messaging Programming WannaCry Blogging IT Management Word data breach How To Chromecast Teamwork Legislation Settings Upgrades Evernote Website WIndows Server 2008 Busines Continuity Windows Ink Near Field Communication risk management Training Administrator MSP Colocation Comparison Nokia Consultant The Blindside Of OneDrive Workers Patch Management Google Maps IT consulting Company Culture Black Market Access Amazon Human Resources Running Cable Specifications Co-managed IT Touchscreen IT Security Updates Regulation Software as a Service Reliable Computing Cleaning Identities Relocation Language Webinar Youtube Tutorial Microblogging Tech Term IT solutions Mobile IT service Proactive Managed Service Provder Webinar Professional Services Domains Taxes Websites Supercomputer Electronic Medical Records Gift Giving Buisness Reputation Shadow IT