Ransomware: How to avoid becoming the next victim

Ransomware: How to avoid becoming the next victim

posted in Cyber-SecurityRansomware ● 21 Mar 2017

2016 was dubbed the year of Ransomware in the technology industry and it remains one of the largest threats to security within the industry today. Redstor have teamed up with computing.co.uk to provide guidance on how to stay protected from ransomware and how to recover if you do get stung.

What is Ransomware

Ransomware has been around for over a decade although it was not until 2013 that it started to become big news, with the arrival of Cryptolocker. Ransomware strains all have commonalities; they make your data inaccessible through encryption and to regain access, you will have to pay a ransom within a set time period.

It has been reported that some scammers have demanded ransoms of up to £1m and in thousands of pounds in schools no less. Even after paying a ransom, there is no guarantee that data will be unencrypted in its entirety and there is no guarantee it won’t be encrypted again.

What’s in the whitepaper?

With Ransomware being such a hot topic, Redstor and computing.co.uk wanted to understand how it has been affecting organizations and how much is known about how to deal with these kinds of attacks. We have completed a survey of decision makers within a range of organizations varying from industry to size and compiled the results.

The whitepaper covers a range of topics including real world ransomware attacks, what the true costs of an attack could be and what defensive measures organizations can take.

With almost 60% of those surveyed indicating they have been affected by ransomware, or know someone who has been, now is the perfect time to find out how to up your protection against ransomware.

Protecting all data, whenever, wherever, forever

Redstor’s data management and security platform encompasses, backup, disaster recovery, archiving and security. By taking a holistic view on data security, Redstor protect data regardless of its location, ensuring that it can be made available again on demand. Our customer community shapes our technology by actively participating in our development roadmap, and we actively respond with monthly releases and feature updates to their benefit.

Download the whitepaper.

Rise in laptop sales leads to data protection worries

Reading, 6 April 2020 – An unwelcome repercussion of employees snapping up laptops for home working ahead of the coronavirus lockdown has been an even bigger spike in cyber-criminal activity.

Continue reading

O365 cyber attacks stress need for isolated backup

Reading, 17 December 2019 – Office 365 is a prime target for cyber criminals – and it’s not difficult to understand why when Microsoft announced this year that it has more than 180m active commercial users every month.

Continue reading

Redstor to showcase pioneering data management technology at Infosecurity

Reading, 26 July 2019 – Redstor, the UK-headquartered company disrupting the world of data management, is pushing ahead with aggressive expansion plans in the Netherlands.

Continue reading