Many business owners don’t know how much they should be budgeting towards IT security. The answer to that is simple: how much does your business stand to lose from downtime? The average amount of time to recover from a ransomware attack (with good backups) is approximately three hours per computer user. Think about the lost productivity of your computer-based employees and systems run by computers and calculate how much money that would cost your business. The basics of cybersecurity for your business can be covered for a fraction of this cost. IT security isn’t always about having impenetrable systems. It’s about being more difficult to compromise and making you business an unattractive target. Hackers are often looking for an easy target and even basic security systems can thwart the majority of penetration attempts.
Best in class Security solutions, optimally priced
In the information age, data security is of utmost importance, especially in business. It is too often that we see even the largest of businesses (and even IT providers, in some cases) infected with ransomware or similar malware that corrupts their data. At Resolved IT we have selected all our solutions to combat this dangerous new type of malware, and earned a significant amount of business from companies who were affected by ransomware by helping them recover and implement preventative measures for the future.
Ransomware is a type of software designed to encrypt your data (essentially scrambling the data, making it unusable) with a private key (password) so that the only way your data can be unlocked is by transferring the hacker crypto currency. This results in total stoppage of all computer systems for the affected business, loss of critical data, and usually a significant financial impact.
Ransomware is most commonly distributed through e-mail phishing attacks. Phishing is when a malicious person sends a genuine-looking but ultimately fake e-mail to employees at a business in an attempt to get them to download a file, enter their password, or otherwise gain access to an employee’s computer. Once a computer on a network has been compromised it is very easy for the virus to spread across the network to other employees’ computers and the company’s server. Once the malware has propagated to all the devices on the network, the malicious software begins encrypting all devices available to it. Often, victims of ransomware will start the recovery process, and then ransomware will re-propagate. This is called a ‘time bomb’ and is a feature of many ransomwares. The attacker will continue to re-encrypt all data on the network until either the ransom is paid or the network is secured by an IT Security Professional.
At Resolved IT, much of our business comes from companies that were affected by this type of attack. We’ve helped dozens of businesses recover from these attacks, especially recently, and have become very familiar with the nuances of several different types of ransomware and how to recover from them. Some have decryption keys available online, some have workarounds and flaws, and some haven’t been decrypted yet. If a ransomware has not been decrypted yet, this means that the data will remain encrypted until the ransom has been paid or it is eventually decrypted by IT Security Professionals. The absolute best way to prevent damage from ransomware attacks is to retain several backups at multiple physical locations with unique passwords. Typically, most businesses already have a backup solution however in our experience is not uncommon for backups to also be encrypted by the attack. Here’s the Resolved IT Ransomware Recovery roadmap:
MSP based in Vancouver BC serving clients in dozens of industries in the lower-mainland