4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ransomware: The Smaller The Business, The Bigger The Problem

Ransomware: The Smaller The Business, The Bigger The Problem

The variety of malware known as ransomware exploded in popularity in 2016, encrypting victims’ files and demanding cryptocurrency payments to restore the data to the estimated tune of $1 billion. This may seem to suggest that large corporations and companies are the primary targets of these cyber criminals--and for some, they are.

However, many small and medium-sized businesses were also victimized by ransomware attacks, often under the mistaken impression that they were too small to be considered worthwhile targets by the perpetrators. Unfortunately for many of these small businesses, this impression ends up costing them big when ransomware strikes.

Ransomware works by encrypting the data stored on a device, demanding that the victim pay a sum in cryptocurrency for their files to be decrypted. This is usually paired with a time-sensitive threat to delete the data if the ransom isn’t paid post-haste.

When attacking large corporations, cybercriminals go for the gold, trying to extort as much as they can from their victim. With small businesses, on the other hand, they take advantage of the common inability many have to afford the solutions that would protect them against such attacks, and ask for a smaller ransom. Considering the relatively high costs many solutions have for a small business, combined with these smaller, more “reasonable” ransoms--plus how much damage even the smallest amount of downtime can cause these businesses--it should come as no surprise that many small businesses see themselves as having no choice but to pay up.

This is problematic for a few reasons.

First, paying the ransom inherently requires entrusting the ones who attacked you to remain true to their word and actually unlock your systems once the funds have changed hands. Are you willing to assume that your attacker is a trustworthy person after they’ve threatened your business?

Second, consider what effect a successful heist against an SMB would have on the cyber criminal. They would naturally be inclined to target more SMBs, possibly returning again to those who proved willing to pay up with a new attack.

Think about it--which would you choose: a possible large payday, or a lot of almost-guaranteed smaller payoffs that quickly add up?

Regardless, it is always better to avoid paying the demanded ransom and to instead rely on proactive measures, such as an off-site (or ideally cloud-based) data backup solution that you can restore your systems with that has been kept safely away from the ransomware.

You also need to make sure your staff is well-versed in recognizing ransomware attacks in order to better avoid them, and what to do and who to contact if their workstation contracts one.

If your SMB needs help protecting itself against the threat of ransomware, reach out to 4IT for assistance. We can advise you on best practices to keep ransomware out of your systems. Give us a call at 305-278-7100 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Internet Business Computing software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Google Efficiency Windows Disaster Recovery Innovation IT Support Hardware Business Continuity Workplace Tips VoIP Saving Money Computer Miscellaneous Virtualization User Tips Upgrade Windows 10 Mobile Devices Mobile Device Management Data Server Mobile Computing Email Network Security Microsoft Office Communication Alert Network Save Money Quick Tips communications Smartphones BYOD Going Green Mobile Office Information Technology Social Media Android Apps Small Business Health Office Smartphone Application Browser Ransomware Gadgets Operating System Outsourced IT Chrome Disaster Tablet Productivity Managed IT Services Firewall Avoiding Downtime Remote Computing Passwords Unified Threat Management IT Solutions Mobility Spam BDR Cybercrime Risk Management Search Telephone Systems WiFi Holiday Managed IT The Internet of Things Facebook Hacking Vendor Management Best Practice Hard Drives Data Management Saving Time Employer-Employee Relationship History Remote Monitoring Budget Automation Cybersecurity Law Enforcement Office Tips Big Data Marketing Proactive IT Phishing Password Hosted Solution Computers Collaboration Customer Relationship Management Recovery Phone System VPN Wireless Technology Apple Printer Bring Your Own Device Office 365 Antivirus USB Content Filtering Shortcut Analytics Social Gmail Router Humor Money Administration User Error Telephony Wearable Technology iPhone Lithium-ion battery Maintenance PowerPoint Virus Current Events Work/Life Balance HaaS Tech Support Data Recovery Outlook Business Intelligence Encryption Point of Sale IT COnsultant Government App Social Engineering Computer Repair Data Backup Cost Management Wireless Intranet Unsupported Software Bandwidth Printer Server Google Drive Cloud Computing Private Cloud Laptop Save Time OneNote Users Trending Education Net Neutrality Windows 8 SaaS Excel Augmented Reality Audit Samsung Vulnerability Wi-Fi Emergency Paperless Office Applications Travel Network Congestion Fax Server Help Desk Update Workplace Customer Service hacker Data Storage Personal Information Biometrics Transportation Retail Streaming Media Virtual Reality Uninterrupted Power Supply online currency Battery Robot Computer Care Meetings Automobile Instant Messaging End of Support Emails HIPAA Entertainment Internet Exlporer Social Networking Benefits DDoS Efficency Computer Accessories Internet of Things Identity Theft Mouse Compliance Data Protection Solid State Drive Flexibility IT Support Two-factor Authentication Display Managing Stress Windows 10 Amazon Value Commerce Safety Co-managed IT Text Messaging Cameras How To User Chromecast Regulation Wiring Upgrades Science Information Virtual Desktop Artificial Intelligence Presentation Ebay Best Available Administrator Debate Sync Training Bluetooth Consultant IT Technicians iOS Computing Colocation Managed IT Service The Blindside Of Managed IT Services Black Market Access Adobe Company Culture SharePoint Touchscreen Computer Fan Politics IT Security Licensing Cleaning Teamwork Dark Web Experience Busines Continuity Nokia Screen Mirroring Keyboard Networking Avoid Downtime Near Field Communication Twitter Music Surge Protector Cast Hiring/Firing Human Resources IT consulting Windows 10s Television Data storage Running Cable Nanotechnology 3D Printing Books Data Security Smart Technology Video Games Reliable Computing Hard Disk Drive Document Management Tablets Root Cause Analysis Data Breach Bloatware Advertising HBO ISP Legal Hard Drive Mobile Device best practices Touchpad NFL CrashOverride Managed Security Blogging IT Management Programming Scam Branding Images Distributed Denial of Service data breach Uograde Word Settings Website WIndows 7 Sports WIndows Server 2008 Employer Employee Relationship eWaste risk management Worker Commute Operating Sysytem Inbound Marketing PDF Regulations Scalability Files Patch Management OneDrive IT Budget Domains Reputation Lifestyle Buisness Webinar Shadow IT Tutorial Relocation IT solutions Mobile Professional Services Gift Giving Microblogging Youtube Taxes Sales Supercomputer Storage Windows Ink Managed Service Provder Electronic Medical Records Webinar IT service