Don't Be One Of The 50%

Ransomware - it takes a computer network hostage. As a type of malware (or malicious software), ransomware encrypts data and makes it inaccessible. After the data is encrypted, the hacker demands that victims pay a ransom, typically paid in Bitcoin (which can't be traced), to obtain a key to access the data.

As the main IT security challenge faced by small and mid-sized businesses, ransomware can be exploited through email, web browsing and removable media. If ransomware hits a business system, in addition to the ransom fee, there is downtime incurred to restore the files. In certain industries, a ransomware attack can cost companies upwards of $4 million.

According to a June 2016 survey by Osterman Research, nearly 80% of organizations have been the victim of a cyber attack during the past 12 months and nearly 50% have been the victim of a ransomware attack. Attacks have taken place mostly via email links with healthcare and financial being the most heavily targeted industries.

Your company is almost sure to become a victim without the proper security measures in place. How can your business avoid being hacked?

  • Regularly update anti-virus software

  • Implement web filtering software

  • Educate employees to think before clicking and to recognize suspicious emails/pop-up ads

  • Backup all data

Once you've considered all you can do to protect your network from a ransomware attack, it's important to prepare for one, just in case. With the ability to replicate and test the availability of your data, a business continuity solution offers access to all files, all of the time. With ProActive's ECHO Business Continuity Solution, you'll never have to wonder if your data is right where you need it, when you need it, saving you precious business downtime.

Ready to talk about your business continuity plan? For more information about ECHO, contact us at 804-897-8347 or email

#internetsecurity #webfiltering #antivirus #businesscontinuity #ransomware #backupservices #backupandrecovery #cyberattack

Featured Posts
Recent Posts
Search By Tags
Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square