Protection against Ransomware
Protect yourself against harmful software such as Tesla, Locky and so on, which encrypts your files and demands a ransom to decode it.
Hornetsecurity Advanced Threat Protection is the perfect protection for your company against Ransomware
What is Ransomware?
This type of cyber attack encrypts your data on the computer so that you cannot open it. A ransom is demanded for the key to decode it, which often has to be paid in the digital currency Bitcoins and is therefore difficult to trace. The malware can spread over your entire network and thus bring important processes to a standstill.
How does Ransomware work?
Ransomware can be transferred by concealment in advertising in e-mail attachments, for example, as is the case with Goldeneye, or in macros in Microsoft Office documents. The harmful software can also enter your network via URLs or exploit kits. Infection with exploit kits often takes place via infected websites or advertising.
Ransomware detection in Germany
October 2015 – February 2016, modified source: BSI
Current situation and damage to companies
The number of attacks using Ransomware has increased steadily in recent years and has reached a peak since the start of 2016. Tesla, Locky, Goldeneye and so on have been the downfall of many targeted companies. According to BSI, a third of the companies surveyed have already been affected by Ransomware and 75% of those cases were the result of infected e-mail attachments. It is therefore particularly important to protect yourself against attacks of this sort. After all, not only costs to your own company can be caused, such as interruption to production, forensics or fines, but also external losses such as failure to comply with contractual conditions or meet delivery times. This affects customers, partners and employees and damages the reputation of the company as a whole.
Hornetsecurity ATP protects you with:
This filter mechanism checks e-mail attachments for harmful code by creating a secure test environment (the sandbox). In this virtual, isolated area, potentially unsafe actions can be carried out and their effects tested. If it emerges that malware is present, the e-mails are sent directly into quarantine and the company’s IT security team is notified.
When Hornetsecurity ATP classifies e-mails as suspicious but cannot categorize them definitively, freezing is used. Suspicious e-mails are temporarily frozen so that they can be scanned again with updated signatures after a short time. This also allows zero-day-exploits to be detected – as soon as the virus detection engines come across something in the second scan, the e-mail is moved straight into quarantine.
How to respond to attacks
- You should not pay the ransom under any circumstances, as you will only be financing the attackers for their next attack.
- Get the police involved so that they can pursue criminals who are located abroad.
- Remove the infected systems from the network to limit the damage.
- Reinstall your systems to restore your data.
Request a quote!
Would you like to find out how much Advanced Threat Protection costs? Then ask us for a no-obligation quote now. You can also try out our service for 30 days free of charge. Simply make use of our fully automated onboarding option.
Try out our product now!
By providing just a few details, you can also try out Advanced Threat Protection right now for 30 days with no obligation. Simply create an account and in just a few minutes your employees and IT systems will enjoy additional protection.