• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
easy GDPR - we make compliance with GDPR easy

easyGDPR

We make implementing General Data Protection Regulation Easy

  • Home
  • Services
    • Software
      • easyGDPR Quickcheck
      • (DEP) easyGDPR lite
      • (DEP) easyGDPR Standard
      • Data Subject Requests
      • Sophos
    • IT Security
    • network checkup
    • SME digitization funding
    • Data protection consulting
      • Data protection
      • Cybersecurity
    • Training
      • Data protection
      • Cybersecurity
  • Partner
    • Resellerprogramm
    • Affiliate programm
  • GDPR
    • GDPR News
    • FAQ
    • GDPR Decisions
    • GDPR penalties
    • GDPR legal text
  • Shop
  • Contact
    • Contact
    • Newsletter registration
  • Login
    • Shop / Affiliate Program
    • easyGDPR Software
  • German
  • English

Ransomware – Data held hostage!!!

22/12/2020 by Maria Steindl-Schindler

According to the 2019 Official Annual Cybercrime Report, every 14 seconds a business owner falls victim to a ransomware attack. Now Brown-Forman, US liquor manufacturer and owner of the brands e.g. Jack Daniel’s has also become a victim of a ransomware attack.

Ransomware is constantly evolving. Business owners also need to evolve security strategies to protect their data and assets.

According to Bloomberg, the hackers stole over a terabyte of data when they penetrated Brown-Roman’s network. This makes the American liquor manufacturer the latest prominent victim of a ransomware attack.

Ransomware is software that denies users access to devices or computer systems until a ransom (ransom) is paid. This malware encrypts valuable data and locks users out of their own system. A ransom is demanded for the decryption key, which is usually paid in the form of Bitcoins or other cryptocurrencies.

Thus, the data taken hostage can be information about customer data, but also data from operational technologies e.g. compressors, pumps, etc. can be affected. If it is customer data, dissemination results in a serious data breach. This incident must also be reported to the data protection authority. However, there is also no guarantee that the affected party will regain access to their devices and data after paying the ransom, which is why prevention is ultimately the best strategy in this context.

How can you protect yourself from ransomware attacks?

Employee trainings

A large part of ransomware attacks occur via spam and phishing emails. Employees should therefore be trained to recognize suspicious links in their email inbox and report them to their supervisor or IT manager. Even though employees are among the most frequent victims of cyberattacks, managers are better targets because they usually have access to more sensitive data and are therefore even more suitable for extortion purposes.

Schindler IT-Solutions offers workshops for companies to sensitize employees and managers to the handling of data. In 4 hours, each participant gets an overview of where the dangers lurk and how to deal with them.

Software updates

Regularly update the software of your devices. Not only firewall and virus protection, but also operating systems and office applications, … Note that a firewall must also be state of the art to provide security. Rely on a next generation firewall and secure your workstations and notebooks with up-to-date endpoint protection. A coordinated safety concept offers more protection. Today there are programs that detect encryption attempts and also automatically make copies of threatened files.

Passwords

Use a password manager. Secure passwords and regular password changes play a significant role in defending against ransomware attacks. In brute force attacks, hackers attempt to gain access to corporate networks by entering as many passwords as possible with the assistance of bots. If common passwords are used and they are not changed regularly, the success for the hackers is even greater. Make sure that you do not use passwords from Linkedin, Anazon, Facebook,.. in the company network as well. Often online services are hacked and the cyber criminals can access the corporate network with the same password.

Regular data backup

Make regular backups of your data and always keep a backup offline. In most cases, not only the original data, but also network storage, drives and cloud locations are encrypted by the malware. In cloud systems with synchronization services such as Dropbox or Google Drive, data may be overwritten if synchronization is performed immediately after data encryption.

Schindler IT-Solutions specializes in data. In workshops on the topic of data security and DSGVO, with the support of certified data& IT security and DSGVO experts, participants will be introduced to cybersecurity and the associated data protection guidelines in practical examples.

Workshops will again be held at the training center in 2100 Stetten in 2021. As always, you can find the current dates on the homepage easygdpr.eu.

From 10 persons it is possible to hold the workshop directly in your company at your desired date or you plan a company outing and use the training center of Schindler IT-Solutions.

Category iconNews

Primary Sidebar

IT-Security Whitepaper Downloaden
  • German
  • English
  • Data Protection Statement
  • Terms and Conditions
  • Imprint
  • Licence terms for easyGDPR
  • GDPR terms
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking "Accept", you consent to the use of ALL the cookies.
SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non Necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

functionality

Diese Art von Cookies erhöht die Benutzerfreundlichkeit unserer Website. Beispielsweise wird darin die von Ihnen ausgewählte Sprache gespeichert. Auch die Verfügbarkeit von Videostreams und sonstigem Inhalt kann von diesen Cookies abhängig sein. Wenn Sie diese Cookies ablehnen, ist die Benutzerfreundlichkeit eingeschränkt.

Save & Accept