CloudJumper News Room

How to Build a Strong Line of Defense Against RansomwareJD Helms


Ransomware is a type of malware that encrypts files and demands a ransom in exchange for recovery of the data.

Individual users at home might be asked for a few hundred or a couple thousand dollars for the files held at ransom. Businesses may be asked to pay millions of dollars for the release of their files.

protect against ransomware

In the last year alone the National Cybersecurity and Communications Integration Center, part of the U.S. Department of Justice, received 321 ransomware related activities affecting federal agencies. On a larger scale, U.S. businesses paid more than $24 million in ransoms in 2015 according to the Internet Crime Complaint Center of the FBI.

Why Ransomware is on the Rise

Ransomware is an attractive attack method for hackers because many companies do not have their data continuously backed up. Without backups, organizations are forced to pay the ransom because the encrypted files are worth more than the amount being demanded.

protect against cryptolocker

Additionally, many large companies and government agencies are apt to pay the ransom because a public announcement of a cyber attack on important files will cause an even greater public relations problem.

How to Protect Against Ransomware

The funny thing about ransomware is that it can cause a lot of damage, but it’s pretty easy to protect against when the right security protocols are in place. As the saying goes, “an ounce of prevention is worth a pound of cure.”

Because ransomware often requires an executable file to be opened by the victim in order to activate malicious code, Cloud Workspace® users have avoided attacks through the use of IT admin controls.

data protection

Users accessing the cloud-based workspace have access to every application installed by the administrator from any device of their choice, but they do not have the ability to install new applications without coordinating with the IT admin. This safeguards the workspace against ransomware executables.

Cloud Workspace®’s administrative controls have prevented even a single Ransomware infection; however in the event that somehow an infection is reported, Cloud Workspace®’s integrated backup-disaster recovery service can quickly restore a customer’s entire environment to its previously unaffected state.

With Cloud Workspace® you have a strong line of defense against ransomware and a reliable recovery plan should your data get hacked.

If you’re ready to take steps to protect important data from ransomware and other internal and external threats, learn more about Cloud Workspace® today.

Why We Blog

At CloudJumper, we are a team of thought-leaders, always seeking to answer, what if? That’s how we came to build the industry’s most robust and easiest VDI/WVD orchestration & management tool.

We seek to bring that same energy to our blog. Weekly, team members from across our company come here to share their thoughts, opinions, and observations about what makes the cloud go. Want to add your own opinion?

We’d love to hear from you! And please remember to share our postings.