Posts

Cyberattacks on individuals and businesses for nasty purposes is nothing new. Stealing data, disrupting business, national activities, and just causing general mayhem has been going on for as long as there has been a digital world to attack. Ransomware, however, seems to stand out as a particularly unique and especially troublesome form of crime. For one thing, once an attack has happened, there is likely nothing to do to retrieve your data until you have given in to the demands of the criminals.

As a small- to medium- sized business owner, you should never just rely on off-the shelf virus protection programs as the sole tool to protect your organization against cyber crime. In all cases you should rely on an IT professional to look at every aspect of your IT infrastructure to ensure that everything possible is being done to protect your data. Beyond that, ransomware attacks are a particularly troublesome form of crime that requires special attention. Some of the routine tools to protect data may still be vulnerable to ransomware. This e-guide will talk about seven specific ways that an MSP is best positioned to help protect you from a ransomware attack.

Before talking about how an MSP can help. Let’s define ransomware. Ransomware is an especially nasty software whose MO is as old as crime: Kidnapping ( in this case, datanapping) Ransomware does this by infiltrating your computer systems and encrypting all of your files, making them unreadable to you. Then like any kidnapper, they post a ransom and hold your data hostage until they get paid. They encrypt your files, rendering them inaccessible to you. The attackers then demand a ransom payment. Ransomware attacks are typically carried out through phishing emails, compromised websites, or exploiting vulnerabilities in software. ( please check out some of our other e-guides on training your employees to avoid phishing emails, and avoiding other easy tricks that criminals use to infiltrate your IT systems.)

What happens once they have encrypted your data? You are probably stuck either paying the ransom or losing the data. In the case of ransomware, sometimes routine backups may be infiltrated. This is why an MSP can be of such value in securing your data against this particular form of cyber crime.

The impact of this crime is pretty obvious. Your data–and your customer’s data–is inaccessible. You have almost no choice but to pay the ransom. The loss of data can disrupt daily business activity and damage customer trust. A successful ransomware attack can lead to brand damage, regulatory penalties for data breaches, and potential legal consequences. The overall consequences can be devastating, making it especially important for you to take proactive measures to prevent such attacks.

The basic preventative measures. Are they enough?

In general, there are some basic textbook best practices you can follow

  • Educate employees about cybersecurity best practices, including identifying phishing emails and suspicious links.
  • Regularly back up data and ensure offline or offsite storage to prevent data loss in case of an attack.
  • Keep software and systems up to date with the latest security patches.
  • Implement robust endpoint protection solutions, including firewalls, antivirus software, and intrusion detection systems.
  • Segment networks to limit the spread of ransomware and restrict access to critical systems.
  • Develop and test a disaster recovery plan to ensure an effective response to an attack.

However, straightforward as these appear, these aren’t as simple to implement as they sound and you may not have the time and labor to devote to designing, implementing, and maintaining these procedures. As an MSB, your focus is necessarily focused on operations, revenues, and sales. A Managed Service Provider has the resources and the expertise to handle your virus protection and ransomware avoidance planning so you focus on revenues.

So what happens when you get software that has been mixed with a strong dose of malicious intent? You get malware, the term used to describe all manner of software invasion that has been designed to do bad things to your computers, networks and digital devices. It may have been created to steal something from you, such as data that can be monetized. It may try to directly steal money from you by draining bank accounts, or using credit card numbers. Sometimes, malware’s intention may be political: it may be about governmental intrigue or industrial espionage, Or it may just be about showing off or causing chaos for its own sake. Whatever the motivation, every organization needs to be constantly on guard to protect its data. Failure to protect the data of your clients and employees can result in serious damage to your reputation and brand as well as lead to fines from regulatory bodies. It can also open you up to liability from individuals or groups that have been harmed.

Malware isn’t new, of course. As long as there have been computers there has been malware. Long before computers were connected to the internet and other public networks, malware was placed onto floppy discs. Once inserted into a computer, they could wreak havoc. Now, it is through our connectivity that bad actors work to infect our computer systems.

Types of Malware

Malware is an umbrella term that covers an array of specific tools to cause trouble or steal data. These include…

Viruses

A virus is pretty much what you would think. Like the flu, it attaches itself to a host program where it then will try to change the code to steal your data, log your keystrokes, or corrupt your system/data. Generally, to be infected by a virus, some user action has to occur that allows the virus into your system. Example: The user opens a link found in an email that looks to be from a legitimate source, but isn’t.

Worms
Worms are similar to viruses in how they replicate and attempt to cause damage but they don’t require a user action. Worms find vulnerabilities or holes in code that allows them access.

Trojan Horse
Just like the Greek myth, trojans trick you into accepting something you want, but inside it has bad intentions. Basically, a trojan refers to the method the cybercriminal uses to get you to download a virus or other infected program.

Adware
Adware is a type of virus that can invade through various methods, such as a trojan or corrupted software. Adware generally besieges you with pop-up ads.

Keyloggers
This is malware that can track your keystrokes. This particular malware’s goal is to track your keystrokes and identify passwords or credit card information, for example, and then log into your accounts.

Ransomware
No malware seems to get as much media attention as ransomware. And for good reason. Unlike some other forms of malware, once this has invaded, there is very little you can do to eliminate the virus. Ransomware seizes your data and holds it for ransom. Unless you choose to pay the ransom fee, usually in some cryptocurrency, you are out of luck. In the specific case of ransomware, prevention is the key. Having clean backups of your data which are kept continuously up to date is about the only way to sidestep a ransomware attack on your data.

What can you do? Simply put, an off the shelf anti-virus software (now referred to as anti-malware) isn’t going to cut it in the business arena. Your systems are far too complex, with too many endpoints to rely on a solution better limited to home use. More importantly, you need protection systems, such as Endpoint Detection. An MSP is your best resource. As a small- to medium-sized business owner, you have limited time and resources to explore and design these protections on your own. An MSP can be your strategic partner in data and digital security.