Bracknell, United Kingdom, March 06, 2016 --(PR.com
)-- This is why Panda Security has launched its Practical Security Guide to Prevent Cyber Extortion, in which it highlights that European organizations suffer the highest number of sensitive data thefts.
Cyber Extortion: a limitless threat
In recent years, the massive growth in cyberattacks has led to companies having to devote more time and resources to combatting the problem, and finding a security solution that guarantees greater control of their files.
Cyber extortion occurs through a variety of threat vectors: 39% come from insecure or fraudulent websites, 23% from programs downloaded from the Internet, and 19% from infected emails.
One of the most prevalent forms of cyber extortion is Ransomware, which starts with the cybercriminals installing a Trojan program whose purpose is encrypting vital company information. The victim is then advised their information is lost and decryption will only be provided after payment of a ransom (normally by Bitcoin). Although payment doesn’t always guarantee that the company will be able to retrieve their files, or that they won’t become a victim again in the future.
Type of malware: How do they affect the companies?
There are innumerable types of malicious attacks designed to infiltrate networks, cause damage, spy and steal information. Some of the most common are:
• Ransomware - the most notorious families are Cryptolocker, Cryptowall, and CoinVault, which use an ‘unbreakable’ encryption to lock vital files
• Advanced Persistent Threat (APT) - a stealthy approach where the attackers look to extract information on a longer-term basis without arousing suspicion
• Exploit - takes advantage of a security flaw in unpatched systems and common programs
• Phishing - creates a false login website to steal bank details and identity
• Trojan - installs different applications that allow hackers to control the computer
Panda Security’s 5 tips for avoiding cyberextortion
1. Advise your users: keep them up to date with good practice, current security risks and ‘con’-techniques
2. Set out rules for Internet use at work: assign a series of rules that control the reputation of websites that access is granted to.
3. Implement a security solution for your needs: make sure you have the right solution for your business according to your infrastructure and requirements.
4. Establish protocols: control installation and running of software. Also check which applications have been installed on a regular basis.
5. Always update: set out an update policy and block certain applications on your computers.
The complete Practical Security Guide to Prevent Cyber Extortion is available here: http://resources.pandasecurity.com/enterprise/documentation/AD360/Cyberextortion_Guide-en.pdf
This and more information on how Panda Adaptive Defense 360 can help protect IT networks against all forms of cyberattack is available at http://promo.pandasecurity.com/adaptive-defense/en/
About Panda Security
Founded in 1990, Panda Security is the world’s leading provider of cloud-based security solutions. With head offices in Spain, the company has direct presence in over 80 countries, products translated into more than 23 languages and millions of customers around the world. The company’s mission is to simplify complexity, creating new and improved solutions to protect users’ digital lives.
For more information, visit http://www.pandasecurity.com/.
Tel. 0844 335 3791
Direct Tel: 01344 398983
LinkedIn - https://www.linkedin.com/in/mrneilmartin
Facebook - https://www.facebook.com/PandaSecurityUK
Twitter - http://twitter.com/PandaSecurityUK
Youtube - http://www.youtube.com/PandaSecurity1