CloudJumper News Room

CloudJumper Cloud Workspace® Presents Important First Line of Defense Against CryptoLocker, CryptoWall, JIGSAW and Other Ransomware Attacks


GARNER, NC – (June 28, 2016)CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, today announced the cyber-security advantages of its Workspace as a Service platform against CryptoLocker and other ransomware threats. While an increasing number of ransomware attacks have occurred across traditional on-premises computing infrastructure, CloudJumper Cloud Workspace® has supported customer environments against the perpetrators of these crimes. Due in large part because most ransomware requires an executable file to be opened by the victim in order to activate malicious code, Cloud Workspace® hosted workspace partners and users have avoided attacks through administrative controls and a comprehensive backup-disaster recovery process.

According to the U.S. Department of Justice , “The Internet Crime Complaint Center (IC3) received nearly 7,700 public complaints regarding ransomware since 2005, totaling $57.6 million in damages. Those damages include ransoms paid — generally $200 to $10,000, according to the FBI  — as well as costs incurred in dealing with the attack and estimated value of data lost.”

A category of computer malware that encrypts its victim’s files and demands a ransom in exchange for recovery of the data, ransomware has become a significant concern as affected victims have had to pay the ransom to free (unencrypt) their files. Many organizations face an uphill battle when confronted with the challenges posed by this class of cyber threat because recovery strategies have been controversial (paying the ransom) and results have been mixed (recovery is not guaranteed). Estimated to have been initiated in 2013, CryptoLocker propagates through infected email, encrypts user data, and stores the key on virus control servers until the ransom is paid.

CloudJumper Cloud Workspace® places the responsibility of installing all applications in the hands of the authorized IT administrator. The identification and selection of these applications is predetermined by the service level agreement (SLA) in place which details all systems in operation (including infrastructure, software, and services) under management as approved by the customer. Users accessing the cloud-based workspace have unprecedented access to every application installed by the administrator from the device of their choice but do not have the ability to install applications directly and must coordinate with the administrator – safeguarding the workspace against such ransomware executables. CloudJumper’s administrative controls have prevented even a single ransomware infection; however in the event that somehow an infection is reported, CloudJumper’s integrated backup-disaster recovery service can quickly restore a customer’s entire environment to its previously unaffected state.

“Security is an often overlooked advantage of Cloud Workspace® regardless of whether the threat is internal or external. With controlled access to the network, Cloud Workspace® provides an additional level of protection against what can be a devastating malware attack,” said JD Helms, president, CloudJumper. “With no reported ransomware issues to date, the lines of access we have drawn are not only providing new measures of accountability for organizations of every size but reducing the level of risk from malware that has plagued computer users worldwide.”

Tweet This: .@CloudJumperWaaS Cloud Workspace® Presents Important Defense Against CryptoLocker and Other Ransomware Attacks –

Contact CloudJumper today to schedule a product demonstration at:  
Follow CloudJumper on Twitter at:
Visit CloudJumper at:

About CloudJumper
Founded in 2016, CloudJumper is a workspace as a service (WaaS) platform innovator for the agile business. It launches itself from the platform its sister company, nGenx built over more than 16 years as a cloud pioneer, taking its new Workspace as a Service solution to a greater height with its concurrent user model.  Many of the key personnel from nGenx have also made the transition to CloudJumper.  CloudJumper built its concurrent WaaS model working with strategic partners such as Microsoft, Intuit, Google, IndependenceIT, Artisan Infrastructure, and others. Head and shoulders above the competition, CloudJumper concurrent WaaS model provides the industry’s most robust cloud desktop and provides a unique cost-savings option that focuses on both named and simultaneous users. CloudJumper markets its solutions through both white label and agency programs supported by the CloudJumper control panel, a single pane-of-glass provisioning system that allows partners and enterprise customers complete control over their IT environments.  For more information, visit About CloudJumper.


CloudJumper Agency Contact:
Joe Austin
The Ventana Group

Why We Blog

At CloudJumper, we are a team of thought-leaders, always seeking to answer, what if? That’s how we came to build the industry’s most robust and easiest VDI/WVD orchestration & management tool.

We seek to bring that same energy to our blog. Weekly, team members from across our company come here to share their thoughts, opinions, and observations about what makes the cloud go. Want to add your own opinion?

We’d love to hear from you! And please remember to share our postings.