Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Targeted Ransomware Checks for Particular Attributes

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.

This transition took place over the last year, as attackers abandoned the traditional approach which assumed that if enough potential victims were infected by ransomware, a cybercriminal could expect a number of them to pay up. Spam messages were the favorite method of spreading this kind of ransomware.

While this kind of widespread ransomware is by no means ineffective, attackers that use ransomware as their preferred tool have discovered the benefits to using it a little differently.

Rather than sending out widespread, indiscriminate attacks, there have been rising numbers of ransomware attacks that focus their efforts in on a more specific target base. Attacks have begun to be focused in on certain industries, company sizes, and geographic locations, and ransomware attackers are becoming more sophisticated and convincing in their composition of phishing emails.

This year, companies and organizations in the manufacturing, finance, healthcare, higher-education, and technology industries were targeted by campaigns utilizing variant strains of common ransomwares. These targets tended to be larger, as that meant that there were more endpoints to potentially gain access to.

Regardless of the size of the ransomware campaign and if it is particularly targeted to one industry or not, you need to be prepared to protect against it. In today’s IT landscape, there isn’t a single solution to totally protect your business from these types of threats, and often businesses need to deploy managed software and hardware protection as well as commit to best practices like two-factor authentication and strong passwords.

Reach out to the professionals at Haber Group for assistance with your business’ cybersecurity.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Hackers Privacy Malware Email Business Internet Microsoft Hosted Solutions Business Computing Software Windows 10 Computer Android Ransomware Backup IT Services Network Security Google Smartphone Small Business User Tips Productivity Windows Mobile Devices Hardware Data Management Gmail Data Browser Phishing Efficiency Facebook Office 365 Upgrade Smartphones Saving Money Business Continuity Internet of Things App Encryption Word Managed IT Services Innovation Tip of the week Office Tips IT Support Artificial Intelligence Workplace Tips Remote Monitoring Managed Service Provider Outsourced IT Cloud Computing Microsoft Office Big Data Data Recovery Social Media Robot Business Management Risk Management Firewall Customer Service Windows 10 Two-factor Authentication Productivity Server Chrome Data storage IT Support Money Employer-Employee Relationship Disaster Recovery Government WiFi Antivirus Cybersecurity Apple Spam Settings Miscellaneous Content Filtering IBM Business Technology HIPAA Wireless YouTube communications Infrastructure Apps Holiday Customer Relationship Management Wi-Fi Printing Hacking Mobile Security Computing Passwords End of Support Google Drive Presentation Hacker Avoiding Downtime Scam Tablet Office LiFi Vulnerability Wireless Technology Save Money Recovery Virtual Reality Analytics Data Security SaaS Bandwidth Virtual Private Network Outlook Search Unified Threat Management Monitors Managed IT Services IT Management Telephone Systems Augmented Reality Administration Automation VoIP Maintenance Safety Password Mouse The Internet of Things Communication Data Backup Mobile Device Network Hosted Solution Dark Data Alt Codes Retail Cybercrime Data loss Network Management Going Green SharePoint Managed IT Service Knowledge Managed IT Fraud Typing Social Engineering User Lenovo Applications Digital Touchscreen Downloads Unified Communications Break Fix Experience Shortcut Disaster Operating System Competition Politics Cryptocurrency Running Cable Superfish IT Technicians Spyware Collaboration 5G Virtual Desktop Multi-Factor Security Dark Web Patch Management Hotspot Uninterrupted Power Supply Tech Support Bitcoin How To Laptop Document Management File Sharing Information Technology Marketing Google Calendar Network Congestion Net Neutrality Language Solid State Drive Google Docs Samsung Websites IP Address Windows 8 Halloween Networking How To Heating/Cooling IT service Google Wallet Legislation Computers FCC VPN Computing Infrastructure Hard Disk Drive Website Mobile Office Scary Stories Firefox Servers BDR Drones Hard Drives Comparison Display Title II Alerts Mobile Device Management Social Sports Techology Server Management Google Maps Refrigeration Education Specifications Deep Learning Online Mail Merge Licensing Humor Public Speaking Lithium-ion battery Hacks Unified Threat Management Digital Payment Black Friday Statistics Budget Bring Your Own Device Microsoft Excel Address Cooperation sip BYOD Quick Tips Buisness User Error Cyber Monday Bluetooth Fun Undo IT solutions telephony Best Practice Blockchain Staff Corporate Profile Computer Care VoIP Vendor Management Application Gadgets Printer Smart Technology Cortana Virtualization Storage Business Growth Writing Permissions Wearable Technology WannaCry Training Time Management Automobile Current Events Downtime Users Access Control Distributed Denial of Service Cabling Paperless Office Legal Gadget Staffing Administrator Personal Information Web Server Remote Computing GPS Computer Repair Cameras Processors Tracking Health CCTV Alert Mirgation CrashOverride Electronic Medical Records Identity Theft Travel G Suite Notifications Botnet Upgrades Supercomputer Motion Sickness Taxes Crowdsourcing Domains Machine Learning 3D Printing IT Budget Update IT Consultant Relocation Unsupported Software Meetings Chromebook Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Mobile Computing Point of Sale Black Market Law Enforcement Emergency Physical Security Twitter