How ransomware can hold your business hostage

How ransomware works Ransomware can make its way onto a system through a variety of means, with the victim ultimately downloading and installing a malicious application. Once on the device, the app will spread throughout the system and encrypt files on the hard drive or simply lock the system itself. In some cases, it may block access to the system by displaying images or a message across the device’s screen to persuade the user to pay the malware operator a ransom for the encryption key to unlock the files or system. Bitcoins are a popular form of ransomware payment because the digital currency is difficult to trace. 3 Phishing emails One of the most common distribution methods of ransomware is phishing emails. These types of emails attempt to entice recipients to open an email and click on a website link. The site may ask for sensitive information or contain malware, such as ransomware, that is downloaded onto the victim’s system. 23% of recipients open phishing emails and 11% actually click on the attachments1. 1 4 2015 Verizon Data Breach Investigation Report
Please complete the form to gain access to this content