At the end of last year, ZDNet posted an article saying that businesses should expect to be screwed by ransomware in 2022. We have all heard of ransomware, and some have even been hit by it. Those who have know it is crippling and expensive to remedy. So, the question is are you prepared for it or prepared to be screwed by it?
What most of us do not know is that it continues to rise. Ransomware-as-a-Service (RaaS) is now a thing. Anybody can subscribe to it, and use it to extort money from their victims. There is also the prediction that there will emerge subscription-based services where businesses pay hackers not to attack them, a high-tech version of the old mafia protection schemes. As business owners we can expect it to become more prevalent and expect the victims to be smaller than those identified over the last year. The “big game” are already taking steps to protect themselves, leaving the “small game” to be exploited if not protected.
One of the most common methods used to gain access to a business’ computer system is by sending email with malicious links or attachments. Once an employee clicks the link or the attachment, the attack will be implemented. Ransomware hackers will often send large numbers of emails hoping some careless or unsuspecting person will click the bait, or will target people in specific positions. The goal is the same – obtain access to the computer network, and then unleash the hounds.
Fortunately, there are things that can be done to avoid disaster:
First, train your people to know what to look for in emails and attachments and what to do if something suspect is found. Then, train again. And, again. As part of that training, conduct random “phishing” testing among your employees to determine how effective your training has been.
Second, buy cyber-insurance that covers ransomware attacks. When you do, be prepared for the insurer to review your systems and prepare to discover some weaknesses.
Third, work with your IT people to establish a system to regularly back up your data off-line and in multiple places separate from your main computer system, implement technical defense mechanisms, and develop a plan detailing what you will do if attacked.
Finally, consult with your IT professionals about other steps you can take, such as implementing EDR software, to protect your business and your wallet from the loss that follows a ransomware attack.