There are a number of ways that your company may find itself the victim of a ransomware attack. One of the most common methods of attack is through so-called “phishing” spam. An example of this would be an email that comes into an employee’s inbox that purports to be a legitimate message with an attachment. Picture an email that claims to be a vendor seeking payment with a file titled “Invoice” attached. When the attachment is downloaded, the attack is on. The purported “Invoice” was malicious code, and the files on the network are now encrypted.
Another method of attack is through exploitation of software security holes. Yet another key attack vector is through compromised remote desktop protocol connections. Despite the existence of common secure remote connection best practices to solve this issue, many organizations are unaware and remain vulnerable.
To schedule a call with a Cottingham & Butler representative, please CLICK HERE.