Five Persistent Myths About Ransomware | Free Antivirus

For companies the worst-case scenario: a hacker is in the network and has encrypted sensitive data or Stole passwords. Veritas corrects misconceptions about ransomware and Ransom demands and offers tips on how businesses can protect themselves.

Ransomware is now part of everyday business life. The corona pandemic in particular offers criminals further opportunities for fraud. If hackers make it into the company network, they try to force ransom demands, sometimes up to six figures. Sascha Oehl, Technical Director DACH at Veritas, knows that companies often make wrong decisions in such a stressful sit



nation. He dispels five persistent myths about ransom demands and offers tips on how businesses can avoid ransomware attacks.

Myth 1: Paying the Ransom Helps

In the worst case, data theft can bring business to a standstill for days. Very few can afford that. As a result, affected companies tend to pay the ransom as soon as possible. However, as Oehl reports, the data can usually not be restored even after paying a ransom. The company has to invest very large sums of money again.

In addition to the financial losses, the reputation is also damaged after a successful attack. This may be followed by the loss of customers. Oehl warns that the solution must never be to pay money to the blackmailers. Because this would encourage the criminals to continue their activities.

Myth 2: Hackers Are only Interested in Victims Who Have Sensitive Information

Regardless of industry, position, or identity, hackers primarily target employees. Their e-mail addresses, passwords, bank accounts, but also encrypted databases are of interest. Veritas reports that more and more small and medium-sized businesses are also falling victim to hacking. Because their IT is usually less well protected and the security systems are therefore easier to bypass than in large companies.

Myth 3: One Security System Is Enough

According to Veritas, companies are adopting increasingly professional and up-to-date security systems, but no system is infallible. Especially since the attacks are becoming more and more sophisticated. Also, the continued increase in remote work supports the cyber risk: Work devices are located outside the protected company network, which creates more vulnerabilities and potential gateways. Oehl, therefore, recommends training employees on current phishing attacks and developing effective data management and backup strategy.

Myth 4: Employees Cannot Be Effective Protection Against Ransom Demands

The human factor is crucial when it comes to IT security. Since employees are the preferred target of hackers, they can also help build strong defenses. With regular and sustained training for the entire workforce, they can become an early warning system.

Myth 5: One Backup of The Data Is Enough to Restore It

According to Oehl, companies that have a backup system have already taken the first step to secure their data against ransomware. But that's not enough. Because the malware has spread in the network, the backup stored there is also affected. Veritas recommends off-site secured backups. To prevent the encryption of critical data by hackers, these should always be kept separate from the production system. Also, a combination of cold storage solutions, such as external or offline hard disk drives, and multifactor authentication can protect backups from system infections. Also, give a trial to our free antivirus for advanced protection.

Comments