logo

Select Sidearea

Populate the sidearea with useful widgets. It’s simple to add images, categories, latest post, social media icon links, tag clouds, and more.
[email protected]
+1234567890

Support: 0208 1668 716 | Sales: 0330 1224 420

Follow Us:

Recent Comments

    Serious security threats of today “Ransomware”

    Security threats

    Serious security threats of today “Ransomware”

    Today more than ever, security should be a priority for every business. Small and medium sized businesses are the ones who suffer most when under attack from security threats

    One of the most common ways to attack is to use security vulnerability in software in applications like Java, Adobe and operating systems, including the perceived invulnerable MAC OS. I am sure everyone remembers the 2 major vulnerabilities of 2014 making the headlines. The heart bleed in OpenSSL and the shell shock affecting all Unix based systems. The way to protect your business against these attacks is to always apply all security patches for all OS systems and applications.

    Another type of security threat which has been growing rapidly since 2014 is Ransomware. This is probably the most dangerous threat as it encrypts all files on the user’s computer and any storage available on the network. Ransomware usually spreads through emails with various attachments pretending to be a fax or an invoice.

    To protect yourself, never open emails which look suspicious, even if they come from someone you know. If you do make the mistake of opening one of these, you will start to see various types of files with decrypt in the name and when you open your file it won’t be readable. Time is precious as encryption is time consuming and not all files will be encrypted initially.

    Shut your computers and server down, including any network attached storage and call a specialist to help you stop further encryption. This is important as the encryption is sophisticated (RSA-2048) and is pretty much impossible to decrypt with the current technology available. Once your system is infected, the attacker will request a payment in bitcoins, which is an untraceable currency, to provide you with the decryption key. The only options to get your data back are to recover it from an uninfected backup or pay the ransom. The ransom increases with time and is only available for limited period until it gets destroyed.

    So please take action now and make sure you have a working backup before it’s too late. If you have any questions regarding cyber-security and security threats? Don’t hesitate to contact us via our email or call us on 0330 1224 420 

     

    Questions: [email protected] 

      

    Here's our live calendar!  

      

    Continue reading: 

    Ransomware, Spyware and Trojans – What are They and How to Prevent Them

    A clever new type of ransomware attack

    Phishing Detection – How Using the SLAM Method Can Improve Detection

     

    [hubspot portal=”25047923″ id=”fbd0c3f3-487c-4414-affa-dee147818244″ type=”form”]