Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Targeted Ransomware Checks for Particular Attributes

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.

This transition took place over the last year, as attackers abandoned the traditional approach which assumed that if enough potential victims were infected by ransomware, a cybercriminal could expect a number of them to pay up. Spam messages were the favorite method of spreading this kind of ransomware.

While this kind of widespread ransomware is by no means ineffective, attackers that use ransomware as their preferred tool have discovered the benefits to using it a little differently.

Rather than sending out widespread, indiscriminate attacks, there have been rising numbers of ransomware attacks that focus their efforts in on a more specific target base. Attacks have begun to be focused in on certain industries, company sizes, and geographic locations, and ransomware attackers are becoming more sophisticated and convincing in their composition of phishing emails.

This year, companies and organizations in the manufacturing, finance, healthcare, higher-education, and technology industries were targeted by campaigns utilizing variant strains of common ransomwares. These targets tended to be larger, as that meant that there were more endpoints to potentially gain access to.

Regardless of the size of the ransomware campaign and if it is particularly targeted to one industry or not, you need to be prepared to protect against it. In today’s IT landscape, there isn’t a single solution to totally protect your business from these types of threats, and often businesses need to deploy managed software and hardware protection as well as commit to best practices like two-factor authentication and strong passwords.

Reach out to the professionals at Haber Group for assistance with your business’ cybersecurity.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 May 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Email Privacy Hackers Malware Business Internet Business Computing Hosted Solutions Computer Microsoft Software Ransomware Backup Windows 10 Network Security Android Google Mobile Devices Smartphone IT Services User Tips Data Management Hardware Small Business Productivity Windows Browser Server Saving Money Business Continuity Tech Term Managed IT Services Internet of Things Gmail Data App Cloud Computing Efficiency Facebook Office 365 Upgrade Smartphones Artificial Intelligence Remote Monitoring Managed Service Provider Encryption Phishing Data Recovery Word Outsourced IT Infrastructure Innovation Office Tips Tip of the week IT Support Business Management Workplace Tips IT Support Disaster Recovery Productivity Microsoft Office Data Backup Big Data Spam Cybersecurity Government Social Media Robot Risk Management Firewall Customer Service Communication Passwords Windows 10 Two-factor Authentication Vulnerability Chrome Data storage Bandwidth Money Employer-Employee Relationship Managed IT Services IT Management WiFi The Internet of Things Apple Settings Antivirus Miscellaneous Content Filtering Data loss communications Apps Business Technology Applications Customer Relationship Management BYOD Automation Hacking Printing Wi-Fi Mobile Security Vendor Management Mobile Device Computing Presentation Google Drive Hacker Avoiding Downtime Office Paperless Office LiFi Wireless Technology Scam Tablet Recovery Analytics Website Holiday VPN Data Security Outlook Search Virtual Private Network End of Support Server Management Administration Augmented Reality VoIP Password Safety Telephone Systems Save Money Virtual Reality Mouse Maintenance Network SaaS Storage Hosted Solution Unified Threat Management HIPAA IBM Monitors Wireless YouTube Fraud Chromebook Knowledge Internet Exlporer SharePoint Network Management Typing User Managed IT Service Managed IT Modem Value Digital Unified Communications Competition Experience Lenovo Operating System Downloads Computer Care Touchscreen Cryptocurrency IT Technicians Running Cable Break Fix Shortcut Cookies 5G Disaster Virtual Desktop Professional Services Spyware Hotspot Superfish Multi-Factor Security Training Bitcoin Mirgation Laptop Writing Marketing Dark Web Patch Management Information Technology Nanotechnology Automobile Uninterrupted Power Supply USB Language Google Docs Google Calendar Windows 8 Chatbots IP Address Halloween Retail Net Neutrality Google Wallet Screen Reader Solid State Drive Dongle How To Computing Infrastructure Remote Computing Networking Legislation Heating/Cooling Identity Mobile Office IT service Scary Stories Social Engineering Hard Drives FCC Drones Smart Tech Hard Disk Drive Firefox Alerts Comparison Servers Social Mobile Device Management Politics BDR Sports Refrigeration Title II Connectivity Collaboration Education Humor Deep Learning Licensing Public Speaking Techology Specifications Document Management Hacks Compliance Lithium-ion battery Tech Support Google Maps How To Online Mail Merge Budget IoT File Sharing sip Bring Your Own Device Cooperation Samsung Network Congestion Unified Threat Management Black Friday Identity Theft Statistics Regulations Websites Buisness IT solutions Undo Microsoft Excel Address Star Wars Fun telephony Quick Tips Best Practice Staff Computers User Error Gadgets Cyber Monday Bluetooth Social Networking Application Virtualization Cortana Blockchain Cost Management Corporate Profile Printer VoIP Business Growth Wearable Technology Display Users Smart Technology Current Events Motherboard Downtime WannaCry Permissions Legal Assessment Access Control Dark Data Time Management Alt Codes Cybercrime Distributed Denial of Service Digital Payment Going Green Router Cabling Meetings Cleaning Mobile Data Private Cloud Webcam Emoji Work/Life Balance Error Point of Sale Black Market Law Enforcement Physical Security CrashOverride Twitter Staffing Gadget Personal Information Administrator Web Server GPS Computer Repair Service Level Agreement Cameras Domains Processors Tracking Health CCTV Alert Electronic Medical Records Travel G Suite Notifications Supercomputer Mobile Computing Botnet Upgrades Motion Sickness Taxes Crowdsourcing IT Budget Machine Learning 3D Printing Update Emergency IT Consultant Relocation Unsupported Software