How Safe is Your Data?

[fusion_builder_container hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” padding_top=”” padding_bottom=”” padding_left=”” padding_right=”” admin_toggled=”no”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” border_position=”all” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”no” min_height=”” hover_type=”none” link=””][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” class=”” id=””]

Data handled by businesses of all sizes has value in the eyes of hackers, and they’ll use any method they can think of to get their hands on it.

Ransomware is the fastest-growing cyberthreat

and it’s essential for your business to have protections in place against the newest forms of this infectious malware.

Ransomware attacks systems and spreads through networks, locking down data access and putting daily business tasks at a standstill while hackers demand payment in exchange for a decryption key. Both enterprises and small companies are at risk for these attacks. As a business owner, it’s up to you to take every step possible to ensure your proprietary information and customer data is as safe as possible.

[/fusion_text][fusion_menu_anchor name=”news” class=”” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” class=”” id=””]

Ransomware in the News 

Some of the biggest ransomware attacks in history have occurred in the recent past and dominated the news as they spread across the globe.


Affecting more than 400,000 computers in 150 countries around the world, the WannaCry attack spread using a vulnerability in Windows programming known as EternalBlue. Hackers gained knowledge of the exploit from a U.S. National Security Agency leak, allowing them to launch a crypto worm able to propagate itself throughout computer systems.


The Petya attack affected computers in Europe, the U.K. and the U.S., but the brunt of the attack was felt in the Ukraine and Russia. Petya started out as ransomware capable of triggering a system restart and installing itself as the machine booted up, but a second version dubbed “NotPetya” used the same EternalBlue exploit as WannaCry.

Only 47 percent of those who met the hackers’ ransom demands during the attacks actually received a decryption key to regain access to their data.

Bad Rabbit

This variation of Petya is part of a collection of new strains of ransomware not always recognized by standard malware software. Affecting about 50,000 computers in the U.S. and organizations throughout Russian and Eastern Europe, Bad Rabbit spreads using a “drive-by” attack designed to install malicious software via infected scripts on otherwise legitimate websites. Users are presented with a popup prompting them to download an update for Adobe Flash, but the installation instead delivers malicious code with the potential to spread across networks without any additional outside actions.


About 100,000 computers around the world have been affected by the Osiris variant on the Locky crypto virus. Osiris spreads through spam emails appearing to contain receipts from purchases, prompting users to download infected PDF files. Ransomware is installed when the files are opened, infecting local devices and putting entire networks at risk.

The global cost of attacks like these in 2017 was $5 billion, and the rapid growth of ransomware could drive the impact up to as much as $11.5 billion by 2019. Every attack results in loss of time, profit and consumer trust and can leave business owners with an expensive and frustrating mess. It takes about 33 employee hours and around $300 per infected machine to recover from a ransomware attack, and the damage done to a company’s reputation can linger for years.

[/fusion_text][fusion_menu_anchor name=”dangerous” class=”” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” class=”” id=””]

Is Ransomware as Dangerous as People Say It Is?

Although the ransomware attacks hitting the headlines are often those targeting enterprises and large corporations on a global scale, small businesses are also fair game for hackers. If your company collects, handles and stores data hackers see as valuable, you’re at risk for a ransomware attack.

The Ransomware Statistics You Need to Know

The continuing spread of ransomware means new attacks are now occurring an average of once every 10 seconds, an increase of 2,000 percent since 2015. Attacks in the business sector increased four percent during 2017, and a Cisco report from the same year shows overall ransomware activity has grown 350 percent every year in the recent past.

Additional statistics highlight the trend toward an increase in the use of ransomware:

  • In 2017, 60 percent of all malware attacks involved ransomware
  • Attacks against businesses tripled in 2016 from one every 2 minutes to one every 40 seconds
  • Attacks increased 229 percent in the first few months of 2018

Small business owners need to pay attention to these numbers, especially since 58 percent of cyberattacks were directed at smaller companies as of 2018.

In 2017, 61 percent of small businesses reported falling victim to various cyberattacks, including ransomware.

Compromised Email, Phishing and Ransomware

About 94 percent of ransomware attacks originate from phishing schemes, in which apparently legitimate emails containing malicious links or attachments are used to deploy malware. Once a machine is infected, many forms of ransomware are able to travel throughout the network to which it’s linked, causing widespread shutdowns within organizations.

Another method of extortion now becoming popular among hackers involves gaining access to corporate email information, creating slight variations on legitimate accounts and sending emails to employees. This is known as business email compromise (BEC), or “man-in-the-email” attacks, these schemes are on the rise and could do as much as $9 billion in damage in 2018.

Hackers use BEC to send fake invoices or request money transfers, relying on the same social engineering tactics characteristic of traditional phishing schemes. Thinking the requests have come from corporate offices, employees unwittingly give away money and information to malicious third parties and compromise entire networks in the process.

[/fusion_text][fusion_menu_anchor name=”protect” class=”” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” class=”” id=””]

How You Can Protect Yourself from Future Attacks

Ransomware is expected to continue to be a popular form of attack in 2018. If your systems aren’t already protected, it’s time to implement a solution to prevent hackers from holding your data hostage.

A New Generation of Data Protection

Acronis Active Protection integrates with your current anti-malware platform to safeguard all your data, including backups, against ransomware attacks. Unlike most anti-malware programs, Active Protection doesn’t rely on a database of known threats to determine whether your systems have been compromised. Instead, it tracks patterns in the way data changes from moment to moment, learning what’s normal and what signals a threat. Whitelisted and blacklisted programs are updated based on these patterns to prevent bottlenecks and ensure malicious activity is stopped before damage can be done.

This unique approach to detecting ransomware makes Active Protection a reliable long-term solution. New threats, including attacks on backed up files and small malicious changes to files, show up as data patterns are monitored, and the program is able to actively stop threats and restore locked data should a hacker manage to gain access using any method.

[/fusion_text][fusion_menu_anchor name=”checklist” class=”” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” class=”” id=””]

Keeping Your Data Safe: A Checklist for Small Businesses

In addition to investing in anti-ransomware protection, you can prevent hackers from locking down your data by:

  1. Automatically updating all programs and systems
  2. Performing routine redundant backups
  3. Regularly testing all backups
  4. Educating staff members about common phishing tactics
  5. Routinely evaluating and adjusting user permissions
  6. Creating and reinforcing a clear bring-your-own-device (BYOD) policy

If you’re concerned about security loopholes, have a professional security audit conducted to reveal weaknesses in your current protections. Follow any suggestions given to strengthen systems against future attacks.

Putting a comprehensive anti-malware and anti-ransomware solution in place is the best thing you can do to protect your small business from the extortion schemes of hackers. With Acronis Active Protection as part of your defense system, you can run your business knowing data is being monitored and network activities are actively watched. Should a breach occur, you’ll have the tools in place to stop the hackers in their tracks and restore your data as quickly as possible.

Doing business in an era when data collection is at an all-time high means breaches do happen, and ransomware attacks can be both extensive and costly. Protect your data with a suite of powerful programs and let Acronis handle prevention and restoration so that your business can continue to run without interruption.

To learn more about Ransomware, check out our previous blogs:

[/fusion_text][fusion_recent_posts layout=”thumbnails-on-side” hover_type=”none” columns=”1″ number_posts=”2″ offset=”0″ pull_by=”tag” cat_slug=”” exclude_cats=”” tag_slug=”safedata” exclude_tags=”” thumbnail=”yes” title=”yes” meta=”yes” meta_author=”no” meta_categories=”no” meta_date=”yes” meta_comments=”no” meta_tags=”no” content_alignment=”” excerpt=”yes” excerpt_length=”30″ strip_html=”yes” scrolling=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” animation_type=”fade” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” /][/fusion_builder_column][fusion_builder_column type=”1_1″ layout=”1_3″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_tagline_box backgroundcolor=”#ffffff” shadow=”no” shadowopacity=”0.5″ border=”3″ bordercolor=”#ec4b2c” highlightposition=”top” content_alignment=”center” link=”” button=”Contact Us” linktarget=”_self” modal=”” button_size=”large” button_type=”flat” button_shape=”square” buttoncolor=”default” title=”To Learn more about Acronis solutions,
consult with our experts today! ” description=”” margin_top=”20px” margin_bottom=”20px” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” animation_type=”fade” animation_direction=”up” animation_speed=”0.3″ animation_offset=”” /][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]

Categories: Blog

Tagged as: , , ,

Chat with Us

This site uses Akismet to reduce spam. Learn how your comment data is processed.