NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
November 22, 2016

Beware, Ransomware Attacks - An Attack on the Rise?

NuHarbor Security

A morning routine when I come into work – I turn on my computer and visit multiple cybersecurity news sites to read the latest on the industry. Whether it’s Krebs on Security, Naked Security by Sophos, Reddit Cyber Security, or any other credible source, staying sharp on pain points and challenges is crucial to knowing how to best assist organizations in need.

Among other malicious schemes, a prevalent cyber-crime tactic today is Ransomware attacks, a consistent headliner in 2016. This attack method is a creation of software designed to block access to a computer system until a sum of money is paid to the hacker. Though Ransomware has been around since the late 1980’s, it has only recently come to the forefront of established tools for hackers around the globe as it is refined and new variations have been created.

How does it work?

Instilling fear into victimized employees and businesses, Ransomware attacks are tremendously effective as an extortion method. It targets pictures, documents, files and any data that could be invaluable to your company’s operations. The targeted employee’s browsing behavior or naivety of safe and secure links grants access to the Ransomware attacker, which is their ticket into the system. After having exposed this sensitive information to the hacker, out of sheer embarrassment, anxiety of losing their job or importance of the locked data, they cough up the bounty to recover the files.

The Numbers Don't Lie

Large-scale Ransomware incidents have led the United States and Canadian governments to issue a joint statement about ransomware and its malicious capabilities. Microsoft TechNet states that the United States, Italy, and Canada are countries with the most attacks, USA leading with over 320,000 machines compromised. In the Malwarebytes study of 500 companies in four countries, they found nearly 40% of all businesses experiencing an attack in the past year, and more than one-third of the Ransomware victims lost revenue as a result of the attack.

Just last year, CryptoWall attacks (a form of Ransomware) racked up a $325 million lump sum of money globally, that organizations paid for on that variation, alone.

Top Preventative Measures

So, what can you and your business do to protect yourself? Strengthen defense in depth. Some keys are:

  • Having control of end points and servers and making sure to have a full and complete inventory.
  • Having a good anti-virus strategy and ensuring proper hygiene and configurations of the tool.
  • Having a good backup strategy – in the event where a file is lost to Ransomware, you can recover a version of the file.
  • Having a great Incident Response program and playbook. An instance of ransomware occurs and you can identify that there is an issue, contain the malware from spreading, remove the malware, and restore systems back to an operational state.
  • Having a security awareness program to educate employees when and how to spot certain campaigns which could introduce malware into a corporate environment.

These are a few of the proactive steps one can take to secure your environment and defend against Ransomware attacks.

RESOURCES

https://www.theguardian.com/technology/2016/aug/03/ransomware-threat-on-the-rise-as-40-of-businesses-attacked

https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx

https://www.scmagazine.com/ransomware-became-main-threat-to-android-users-in-1h-2016/article/548118/

https://nakedsecurity.sophos.com/2016/04/04/ransomware-alert-issued-by-us-and-canada-following-recent-attacks/

Included Topics

  • Industry Insights

Related Posts

Industry Insights 3 min read
Social Engineering Attacks: How Human Error Can Shatter Security Shields Read More
2 min read
Get Informed: Learn About Phishing Attacks Read More
Cybersecurity Technology 4 min read
Don’t Get Hooked! How to Identify Common Types of Phishing Attacks Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.