Ransomware IconRansomware. We have all heard it being mentioned, but what is it. Triple4 takes this topic very seriously, and unfortunately, there is no one way to prevent or avoid it. The most important thing to remember is that Ransomware is not a virus. It’s stealthily installed software that has been allowed to carry out its devious purpose of encrypting data and, then hold you the user/owner/custodian to ransom. There are various ways Ransomware can make its why into your environment here are 4 types of Ransomware attacks to be on the lookout for.

Ransomware Attack via Email

One of the most common entry points for Ransomware is through email. Often masquerading as legitimate emails with important content, Ransomware makes its way into your IT environment through malicious attachments or links.
While there are many security layers that can be stacked onto email, there is still a constant risk. Opening one of these attachments or links could prove catastrophic with the mere click of the mouse downloading and installing the Ransomware software onto your system.
In order to protect your IT environment, it’s important to approach the situation with a formative solution, make sure all your users are in the know and you are constantly reviewing your security and email hygiene layers.

Ransomware Attack via web browser

The Internet holds limitless perils and traps, scheming lurkers with only one objective in mind. It only takes one momentary lapse of reason, one inpatient second and one wrong click and you have unwittingly downloaded Ransomware.
Many websites have a malicious line of code that executes the second you open the site, sometimes the site will coerce the surfer to click a link, download a piece of software or even disguise their real intent.
As with a Ransomware attack via email, the best way to avoid allowing Ransomware to enter your IT environment is to make sure all your users are up-to-date on the latest schemes. There are, however, also gateways and protective software elements that can assist.

Ransomware attack by Accident

Following on from a Ransomware attack via web browser comes a Ransomware attack by accident. One of your users accidentally allowed Ransomware attack to happen. An infected thumb-drive brought from home or and external hard drive, even a connection from an internal provider that terminates in the internal network can prove fatal.
Again the best way to avoid this kind of Ransomware attack is through user education, however adopting local end user protection to monitor software activity and investigate the relation to activity on the servers, links and other threat centres; locks down physical access to manageable and considerate levels will also be beneficial.

Ransomware Attack via Active Intent

You may have all the right infrastructure in place, but with vital information suddenly disappearing, data leaked and your business exposed, a Ransomware attack via active intent can prove to be the most disturbing.
While all of your services are supposed to be secured with firewalls and some of your information is backed up using a public cloud service that’s not always enough. It’s always important to ensure that you have a full set of secure offsite backups, you are constantly reviewing your security policies and making sure all your users are frequently resetting their passwords and making use of a two-factor authentication process.
While Ransomware is difficult enough to prevent, when it comes through active intent it’s always important to prepare for the worst and hope for the best.