According to Cybercrime Magazine and Cybersecurity Ventures, global ransomware will cost the world nearly USD $20 billion in 2021 and is projected to exceed USD $265 billion by 2031. On average, the ransom demanded during an attack is roughly $5,600, but what is worse is the downtime after an attack can cost up to 50 times more than the ransom itself.
Ransomware is a type of malware that encrypts important company files and holds them for ransom, which typically ranges from hundreds to thousands of dollars. Last year, cybercriminals made billions of dollars from attacking businesses with ransomware, and because cybercriminals have learned to monetize cyberattacks, their frequency and severity will inevitably continue to grow exponentially.
Most ransomware attacks come in the form of an email attachment, so you should always exercise extreme caution when opening email attachments and never open an attachment from an email you were not expecting to receive or from a sender that you do not recognize. You should exercise the same caution when you receive an email containing a hyperlink from a sender that you do not recognize. With today’s advanced ransomware techniques, all it takes is a simple website visit to become infected with ransomware.
The FBI has provided warnings regarding a sharp rise in ransomware attacks on small and midsized businesses across the United States. There are different types of ransomware and ransomware attacks; however, all of them will prevent you from using your computers normally and will ask you to do something before you can use your computer. These ransomware attacks can:
In some instances, ransomware hackers will also copy files on the attacked system. In those cases, the integrity of sensitive customer/company information is at risk. Ransomware attackers do not discriminate, so companies of all sizes should know how to prevent this cyber threat. Below are the most effective methods of ensuring your business does not fall victim to ransomware:
Our IT services division, ECC IT Solutions, is committed to protecting clients’ sensitive data by proactively addressing security concerns as well as providing relevant and timely security expertise. The ECC IT Cybersecurity Team can help you develop ransomware attack mitigation strategies that are uniquely tailored to your business. Please contact ECC IT at (301) 337-3100 for additional information.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Analytics" category . |
cookielawinfo-checkbox-functional | 1 year | The cookie is set by the GDPR Cookie Consent plugin to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Necessary" category . |
cookielawinfo-checkbox-others | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to store the user consent for cookies in the category "Others". |
cookielawinfo-checkbox-performance | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to store the user consent for cookies in the category "Performance". |
ep201 | 30 minutes | This cookie is set by Wufoo for load balancing, site traffic and preventing site abuse. |
PHPSESSID | session | This cookie is native to PHP applications. The cookie is used to store and identify a users' unique session ID for the purpose of managing user session on the website. The cookie is a session cookies and is deleted when all the browser windows are closed. |
viewed_cookie_policy | 1 year | The cookie is set by the GDPR Cookie Consent plugin to store whether or not the user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_4JQW09H0BS | 2 years | This cookie is installed by Google Analytics. |
_gat_gtag_UA_539141_3 | 1 minute | Set by Google to distinguish users. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
vuid | 2 years | Vimeo installs this cookie to collect tracking information by setting a unique ID to embed videos to the website. |
Cookie | Duration | Description |
---|---|---|
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |