Ransomware

Rie Vainstein • August 14, 2019

…is alive and kicking

Ransomware costs businesses billions of dollars a year. In 2019 it is estimated to have cost businesses in excess of $11.5 billion. The prediction is that this number will rise to over $20 billion in 2020! (For more information on the costs click this link )

Ransomware attackers stop you being able to use your own computing device(s) to access your own information. The attackers effectively lock you out of your own computer.

Kaspersky has created a little YouTube video which explains it very well.

Then, to add insult to injury, the hackers demand payment to provide you with the “key” to unlock your device. Adding pressure to make you pay, they sometimes declare a time limit: that your precious information will be deleted if payment is not made/received by a certain date and time.

Whether to pay has to be weighed against the possiblity that no deryption key will be forthcoming even after the ransom is paid. Remember, these criminals are unscrupulous and cannot be trusted.

The Bad Guys are Watching You!

Why is this a problem?

Apart from the financial aspect of having to pay a stranger to be able to use your own information, there are other implications that may be far more harmful to the business.

Even so, it is estimated that the cost of a data breach can be as high as $3.92 million – per company!

A serious impact is a legal one. If your data center is breached your company will be held responsible. Big money law suits have become commonplace in the current environment.

A more far-reaching impact is that of loss of reputation. The attackers exposing your customers’ information to the world, could open them to identity theft, or industrial espionage if they are a company, and such like. Customers – individual or corporate – can be very unforgiving. If you lose the trust of your customers, it is very difficult – if not impossible – to regain it.

Who is at risk?

Short answer: anyone with a computer system that contains information. The best targets (those with deeper pockets) are large institutions such as governments, healthcare corporations (including providers, such as hospitals), education departments, and large businesses. These are the most fruitful to attack but are usually the most heavily defended.

Smaller businesses are not immune… and may be easier to infiltrate. [Addendum: In August 2019 a network of dentist offices was held to ransom. They paid, but the figure has not been revealed.]

What can we do about it?

For a start, we are told by the FBI to NOT pay ransomware attackers. All this does is (a) risks your money because there is no guarantee they will release you, and (b) encourages them to try the same tactic again.

Companies are actively strengthening their security protocols. Together, they spend billions a year on applications and hardware. IT security teams are being professionally trained on how to spot a breach, what to do in the event it happens, and how to strengthen the system so it will not happen again.

One area that is often missed is the admin staff. They click on email links and visit websites in their downtime. These are the weak links. Read our blog “ Achilles’ Heel ” for more information on what you can do to help mitigate the possiblity of attack.

Remember: no-one is immune and this is one of the costliest threats to businesses success, today.

If you want to get your IT team trained with cutting edge knowledge of how to recognize a threat, what to do about it while it is occurring, and how to prevent it in the future, call us today!

About NC-Expert

NC-Expert is a privately-held California corporation and is well established within the Wireless, Security, and Collaboration industry certification training, courseware development, and consulting markets.

Led by its Founder and CEO, Rie Vainstein, NC-Expert has won numerous private contracts with Fortune level companies around the world. These customers have depended on NC-Expert to train, advise, and mentor their staff.

If you are looking for the best in IT Network Training then call us today at (855) 941-2121 or contact us by email today.

The post Ransomware appeared first on NC Expert.

NC-Expert Blog

By Rie Vainstein March 31, 2025
A Digital Shield for Your Online Adventures As tech professionals, we often spend a good chunk of our lives navigating the digital realm. Whether you’re troubleshooting a network, coding a new app, or just binge-watching the latest series, one thing is clear: your connection to the internet is a double-edged sword. It’s both incredibly convenient and, if not properly secured, a potential vulnerability. Enter the VPN (Virtual Private Network) our trusty, digital bodyguard. If you’re not already using one, or if you’re not entirely sure why you should, let’s walk through some of the reasons why a VPN is essential for anyone working in IT and, frankly, for anyone who uses the internet. What Is a VPN? In simple terms, a VPN creates a secure, encrypted tunnel between your device and the internet. It allows your data to travel securely, masking your IP address, and ensuring that no one (be it hackers or nosy advertisers) can track or intercept your online activity. Think of it as your personal “cloak of invisibility” in the digital world! 
By Phil Morgan March 13, 2025
Troubleshooting Wireless Networks with Ekahau: A Professional Engineer’s Guide Wireless networks have become the backbone of modern business infrastructure. From office environments to large-scale enterprises, ensuring a seamless wireless experience is essential for productivity. However, despite advancements in Wi-Fi technology, network performance issues often arise, ranging from signal interference and dead zones to capacity overloads and channel mismanagement. To tackle these issues efficiently, professional engineers rely on powerful tools. One such tool, Ekahau AI Pro, has become a gold standard in the wireless industry for troubleshooting and optimizing Wi-Fi networks. This blog delves into troubleshooting wireless networks using Ekahau tools, providing practical examples and technical insights to guide professional engineers in improving network performance.
By Rie Vainstein March 3, 2025
Futureproofing Our Security In our increasingly connected world, the security of digital information has never been more critical. From banking transactions to private communications, our data is constantly transmitted and stored across the internet. The current systems that protect this data rely on cryptography, a branch of mathematics that helps keep information secure by encoding it in ways that are difficult to decode without the proper key. However, with the rise of quantum computers, traditional cryptography is facing new and significant threats. This is where Post-Quantum Cryptography comes into play. What is Post-Quantum Cryptography? Post-Quantum Cryptography (PQC) [1] refers to cryptographic algorithms that are specifically designed to be secure against the power of quantum computers. Quantum computers, once they become practical, will be capable of solving complex mathematical problems much faster than classical computers. This will render many of the encryption methods we rely on today [such as RSA (Rivest, Shamir, and Adleman – initials of the inventors) and ECC (Elliptic Curve Cryptography)] vulnerable to attack. Quantum computers operate on quantum bits, or “qubits”, which can exist in multiple states simultaneously, unlike classical bits that are either a zer (0) or one (1). This allows quantum computers to perform certain calculations exponentially faster than classical computers. For example, in a matter of seconds, a quantum computer could potentially break an RSA key, which is considered secure by today’s standards. As quantum computing technology advances, the need for PQC becomes even more urgent.