Ransomware

Rie Vainstein • August 14, 2019

…is alive and kicking

Ransomware costs businesses billions of dollars a year. In 2019 it is estimated to have cost businesses in excess of $11.5 billion. The prediction is that this number will rise to over $20 billion in 2020! (For more information on the costs click this link )

Ransomware attackers stop you being able to use your own computing device(s) to access your own information. The attackers effectively lock you out of your own computer.

Kaspersky has created a little YouTube video which explains it very well.

Then, to add insult to injury, the hackers demand payment to provide you with the “key” to unlock your device. Adding pressure to make you pay, they sometimes declare a time limit: that your precious information will be deleted if payment is not made/received by a certain date and time.

Whether to pay has to be weighed against the possiblity that no deryption key will be forthcoming even after the ransom is paid. Remember, these criminals are unscrupulous and cannot be trusted.

The Bad Guys are Watching You!

Why is this a problem?

Apart from the financial aspect of having to pay a stranger to be able to use your own information, there are other implications that may be far more harmful to the business.

Even so, it is estimated that the cost of a data breach can be as high as $3.92 million – per company!

A serious impact is a legal one. If your data center is breached your company will be held responsible. Big money law suits have become commonplace in the current environment.

A more far-reaching impact is that of loss of reputation. The attackers exposing your customers’ information to the world, could open them to identity theft, or industrial espionage if they are a company, and such like. Customers – individual or corporate – can be very unforgiving. If you lose the trust of your customers, it is very difficult – if not impossible – to regain it.

Who is at risk?

Short answer: anyone with a computer system that contains information. The best targets (those with deeper pockets) are large institutions such as governments, healthcare corporations (including providers, such as hospitals), education departments, and large businesses. These are the most fruitful to attack but are usually the most heavily defended.

Smaller businesses are not immune… and may be easier to infiltrate. [Addendum: In August 2019 a network of dentist offices was held to ransom. They paid, but the figure has not been revealed.]

What can we do about it?

For a start, we are told by the FBI to NOT pay ransomware attackers. All this does is (a) risks your money because there is no guarantee they will release you, and (b) encourages them to try the same tactic again.

Companies are actively strengthening their security protocols. Together, they spend billions a year on applications and hardware. IT security teams are being professionally trained on how to spot a breach, what to do in the event it happens, and how to strengthen the system so it will not happen again.

One area that is often missed is the admin staff. They click on email links and visit websites in their downtime. These are the weak links. Read our blog “ Achilles’ Heel ” for more information on what you can do to help mitigate the possiblity of attack.

Remember: no-one is immune and this is one of the costliest threats to businesses success, today.

If you want to get your IT team trained with cutting edge knowledge of how to recognize a threat, what to do about it while it is occurring, and how to prevent it in the future, call us today!

About NC-Expert

NC-Expert is a privately-held California corporation and is well established within the Wireless, Security, and Collaboration industry certification training, courseware development, and consulting markets.

Led by its Founder and CEO, Rie Vainstein, NC-Expert has won numerous private contracts with Fortune level companies around the world. These customers have depended on NC-Expert to train, advise, and mentor their staff.

If you are looking for the best in IT Network Training then call us today at (855) 941-2121 or contact us by email today.

The post Ransomware appeared first on NC Expert.

NC-Expert Blog

By Rie Vainstein February 13, 2025
Critical Component for Your Future In today’s ever-evolving tech landscape, staying ahead of the curve is crucial. IT certifications not only validate your expertise but also help open the doors to better career opportunities and advancement. Whether you’re just getting started, or looking to advance, certifications from industry leaders like Ubiquiti , CWNP , CompTIA , and Cisco can be game-changers for your career. Why IT Certifications Matter IT certifications are a proven way to prove your skills and knowledge to employers. As businesses increasingly rely on technology for daily operations, they need professionals who can navigate the complexities of IT infrastructure, networks, and security. A certification can give you a competitive edge, help you land higher-paying roles, and keep you on the cutting edge of the tech industry.
By Phil Morgan February 11, 2025
The Grim Realities of Transition Mode Summary of a recent experience relating to Transition Mode. I have been quite vocal of my hatred of Transition Mode (for WPA3). We have a solution for this - dual SSIDs: https://wifisecuritywizard.com/general/problems-with-wpa3/ IMHO - Transition Mode is dumb! Turn on WPA3, and for everything that doesn’t support it, create a second SSID for now... while you upgrade everything! I have actually said “it’s 2025 for goodness sake, how many devices do you have that don’t do WPA3?!” Well, the other day, the universe decided to mess with me... Scenario: in one of our smaller offices, we are upgrading to Ubiquiti. I arrive on site, I upgrade the system, 5GHz only WPA3, everything is working great! I do one last check, and one of the users mentions, “Oh, the Brother color laser printer isn’t working.” (It’s a nice little device. Prints really well. Cheap to run.)
By Phil Morgan January 24, 2025
This blog is a write up of what was discussed at our AMA webinar session. (Link provided inline.)
Share by: