In a recent article, we discussed the rise of cryptojacking affecting businesses. However, this doesn’t negate the prevalence of ransomware and data invasion as a hacktic.


According to the Ponemon Institute for IMB Security’s 2017 Cost of Data Breach Study, the average time it takes to detect a data breach is 191 days, with a range from 24 to 546 days. That’s a long time for hackers to have access to your data. For some companies, it’s longer — like the breach of Marriott Starwood’s data, where millions of records have potentially been exposed, and the hackers were likely in the system for up to FOUR. Years.


Ransomware can affect anything, from personal details to financials to delay of movie screenings, cancellation of company acquisitions, and even city infrastructure. 


What Is Ransomware?

  • A malicious file
  • That holds info/systems hostage until payment is made
  • Through email attachments or links via social engineering


There are 3 key tactics for ransomware to watch out for:

1. Scareware

A pop-up that indicates a security breach and requests immediate payment to download and protect your computer. This is a trick designed to get you to download the malicious file claiming to protect your computer (from a non-existent threat).


2. Screen Locking

You’re locked out! Often, an official-looking emblem mimicking a legal department agency will notify you that illegal activity has been discovered and you must pay a fine.


3. Encryption

Your files are locked with a code that requires the decryption key. Hackers will provide it in exchange for payment.


Think First!

The fastest way to spot a ransomware attempt is to pause before you act. Think:

  • If you’re already paying for an anti-virus program, they wouldn’t be asking you to pay again
  • If you’re not sure, ask your boss or IT department
  • If legal action needed to be taken, a US department would go through legal channels, not lock you out
  • Messages claiming an encrypted file can only be unlocked with payment isn’t legitimate. Restricted access is common, but requiring payment to release that restriction is not


How to Avoid Ransomware

1. Train your employees

This is number 1 because a vast majority of hacks happen due to human error. Your employees are only as weak as the training you provide them with. A managed IT team should be able to provide this kind of training to keep your business secure. Curious what kinds of email subjects tend to result in cybersecurity breaches? Check out this infographic. 


2. Refresh their knowledge

Not once a year, not once per hire, this should happen monthly to quarterly. And it should be tested! Outsourced providers can set up a phishing test to see who of your employees fails to pass the test. Additional training — not reprimands or discipline — should be implemented.


3. Cybersecurity protocol

Have a plan in place. When you’re prepared for the worst, you create opportunities for a better outcome. Create documentation outlining actions to take if ransomware is suspected.


4. Anti-malware and anti-virus

Invest in trustworthy software that can catch the most basic forms. More advanced tactics (involving social engineering) will rely heavily on numbers 1 and 2.


5. Get an IT Provider

This step will take care of numbers 3 and 4. An IT Provider is well-versed in security and has a wealth of tools and knowledge for training, prevention, and crisis mitigation. They have sandboxes, which are safe spaces to open and examine potentially damaging files, they have access to programs that can track the origin of the virus, and more.



Time is of the essence. The less time a hacker has in your system, the less time there is to collect information or do damage. Report the incident immediately. If something about an email seems weird after-the-fact, tell your superior and inform your IT team.


Be vigilant in protecting your business. Train your employees regularly (monthly). Have a plan in place, and be consistent.


Subscribe to our blog