Beyond Email: 5 Alternative Ways to Fall Victim to Ransomware

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Beyond Email: 5 Alternative Ways to Fall Victim to Ransomware-5 Next

How to Stay Protected from Exploit Kits

To stay protected, keep your software updated at all times and back up your data. If backing your data up in the cloud, know that cloud apps aren't 100 percent protected – many types of ransomware can corrupt cloud applications like Office 365 or Google Drive if they're synced to the infected computer. Having protection across your cloud and non-cloud environments is key to remaining safe, secure and compliant.

Ransomware, without a doubt, is dominating the cyber-threat landscape by holding critical systems and data hostage in industries ranging from health care and finance to government and energy. Ransomware is a class of malware that, when distributed to a system, renders victims' systems unusable by encrypting computers and data or by locking applications. The attacker's goal is to blackmail the victim into paying a ransom in exchange for decryption keys, allowing them to regain control of their systems and data.

Most information and reports about ransomware, however, have focused on phishing as a conduit for ransomware delivery and often overlook other distribution methods in use. Attackers are becoming craftier with their methods to spread malware that encrypts files and locks data, blindsiding victims before they even realize they have been attacked.

So while organizations and individuals are performing everyday tasks – like running their businesses in the cloud and using social media – alternative ways to receive ransomware, which don't require victims to open a phishing email, also pose a serious threat. In this slideshow, Aditya Sood, PhD., director of security and Elastica Cloud Threat Labs at Blue Coat, discusses five alternative ways that organizations can fall victim to ransomware and offers advice on how they can protect themselves.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.