Ransomware is a type of malware that encrypts files and demands a ransom in exchange for recovery of the data.
Individual users at home might be asked for a few hundred or a couple thousand dollars for the files held at ransom. Businesses may be asked to pay millions of dollars for the release of their files.
In the last year alone the National Cybersecurity and Communications Integration Center, part of the U.S. Department of Justice, received 321 ransomware related activities affecting federal agencies. On a larger scale, U.S. businesses paid more than $24 million in ransoms in 2015 according to the Internet Crime Complaint Center of the FBI.
Ransomware is an attractive attack method for hackers because many companies do not have their data continuously backed up. Without backups, organizations are forced to pay the ransom because the encrypted files are worth more than the amount being demanded.
Additionally, many large companies and government agencies are apt to pay the ransom because a public announcement of a cyber attack on important files will cause an even greater public relations problem.
The funny thing about ransomware is that it can cause a lot of damage, but it’s pretty easy to protect against when the right security protocols are in place. As the saying goes, “an ounce of prevention is worth a pound of cure.”
Because ransomware often requires an executable file to be opened by the victim in order to activate malicious code, Cloud Workspace® users have avoided attacks through the use of IT admin controls.
Users accessing the cloud-based workspace have access to every application installed by the administrator from any device of their choice, but they do not have the ability to install new applications without coordinating with the IT admin. This safeguards the workspace against ransomware executables.
Cloud Workspace®’s administrative controls have prevented even a single Ransomware infection; however in the event that somehow an infection is reported, Cloud Workspace®’s integrated backup-disaster recovery service can quickly restore a customer’s entire environment to its previously unaffected state.
With Cloud Workspace® you have a strong line of defense against ransomware and a reliable recovery plan should your data get hacked.
If you’re ready to take steps to protect important data from ransomware and other internal and external threats, learn more about Cloud Workspace® today.