Ransomware, in its most basic form, is self-explanatory. Data is captured, encrypted, and held for ransom until a fee is paid. The two most common forms of ransomware delivery are through email and websites.
Just recently, one of our clients was the victim of a ransomware attack. The client lost all of their files. They had no access to their database, reports, year-end accounting — everything. Talk about a nightmare!
The only databases they have now are the ones that enSYNC holds because we uploaded them to our parent company last week. Fortunately, our team spun them up a server and gave them access to an iMIS database (which they are very grateful for as it is the only thing they have access to).
A ransomware attack is almost always initiated by clicking on something in an email that runs an executable. This delivery method could be an actual executable file or a macro in Excel. Most of the time it will appear to come from someone that you believe to be safe, which is called phishing.
In the case of a ransomware attack, even the most experienced computer users can panic. Therefore, every employee should know what to do if they get attacked by ransomware.
For remote staff – if you are connected to a VPN, not only could it encrypt the files on your own computer, but it could encrypt all of the files on shared drives and anyone connected to a shared drive.
For office employees – it could encrypt everything on the network.
If you want to evaluate your current risk level, contact us for a free evaluation of your system security.