Ransomware use by cyber threat groups has grown
[ad_1]
Ransomware use by cyber threat groups has grown by 1,670% each year over the past couple of years. This threat will, in all likelihood, impact the Emergency Services Sector and reports are beginning to emerge that some systems have been compromised. Briefly, a Ransomware attacker sends an email with an attachment containing macros holding the malicious code. This is known as the “payload”. The victim receives the email with attachment and inadvertently opens the attachment. Once opened, the payload goes to work on the victim’s computer system, scrambling data files and “locking down” access. The Ransomware attacker is notified of the email by receipt from the victim and another email is sent instructing the victim to pay in a non-traceable currency for the code to open their computer files. If the victim does not pay, the computer files are destroyed by the malicious code in a specified time. In some cases, the code the Ransomware sends does not work and more demands for payment are made.
Given the DHS report on cyber threats facing Emergency Management (cyber criminals are most likely the perpetrators of attacks), and the likelihood of Ransomware infecting critical emergency management systems, what are the top 3 things you would focus upon to assure confidentiality, integrity and availability?
1 paragraph 3 scholarly references
[Button id=”1″]
[ad_2]
Source link
"96% of our customers have reported a 90% and above score. You might want to place an order with us."
