Google and Netflix Hacked : It's time to act on your IT Security
Hitting the news this week, Google and Netflix have been hacked! (Read our blog about the Netflix hack)
Google, a company with a monetary value of $109.5bn, was hacked via its Google Docs platform last week, while Netflix was held to ransom over popular show Orange Is The New Black. It was a bad week for large companies, though we must stress that no business is safe when it comes to hackers. These cyber-attacks can affect any organisation from a one-man operation and SME businesses, to the big players like Google and Netflix.
Are you safe? Are you protected?
Hacks can come in all types of forms. Ransomware, for example, will include data encryption and a ransom demand of some sort, with the hackers financially benefitting if you decide to pay them off. Unfortunately, Ransomware is not a fictional nightmare. It exists in the digital world we all live and work in today. But how is it such a destructive force that has affected so many small, medium and large businesses? And more importantly, how can you protect your business from such chaos?
The answer is simple: Sophos Intercept X. (sign up to the free webinar here)
What is Ransomware?
Ransomware comes in various forms, such as Cryptolocker, Teslacrypt, Lockscreen and Cryptowall. It’s a malicious malware virus that blocks access to your business’ digital assets. More specifically, it encrypts sensitive, private and business-critical files, and the hacker responsible holds these files to ransom.
So, first and foremost, how can you decrypt the files?
In many cases, you can’t. The second the attack is made, the damage is done. Once the files are encrypted, the hacker will request payment for the release of your files in the form of Bitcoins. The equivalent value may equate to hundreds, if not thousands, of pounds depending on the size of your business and the resilience of the hacker. Once paid, the understanding is that the files will be released and restored. But would you trust a hacker to live up to their word? Me neither…
How does Ransomware get onto my computer?
The infiltration process can be very simple, something you wouldn’t think twice about. You could, for example, insert an infected USB stick into your computer – the equivalent of plugging Freddie Kruger into your computer. It’s going to end badly. Other methods including opening attachments in emails. This might sound obvious to those of us who are familiar with suspicious-looking emails, but modern Ransomware is increasingly discrete. You could receive what appears to be a legitimate email from your line manager and again, it’s game over once the document is opened.
What is Sophos Intercept X?
This is the John McClane of the antivirus world. The hero, the saviour (minus the Die Hard-style explosions and destruction). Intercept X can prevent Ransomware at every stage. If you open an email attachment, the Ransomware virus hidden inside will attempt to encrypt your files. When this happens, Intercept X steps in and blocks any further attacks to the entire computer.
If your files have already been encrypted, Intercept X will decrypt your files instantly – the damage will be reversed, and it’s like it never happened. This is the new patented Sophos technology of Cryptoguard. It’s probably easier to think of it as magic and fairy dust than to explain its inner workings – all we need to know is that we are safe with Intercept X.
That’s not all Sophos Intercept X can do – After an attack is attempted and Intercept X has worked its magic, the Root Cause Analysis tool allows you to see exactly where and how the virus infiltrated your system, and it sets up further protection so that this is less likely to happen in the future.
Fantastic! Where can I find out more?
TSG is running webinars showcasing Sophos Intercept X. You’ll have the opportunity to ask our experts any questions you may have regarding your business security, and you’ll get to see Intercept X in action.
Certification & Compliance: Securing your data and enabling clients to secure theirs
Date: 11/07/23 12:00
Business Continuity: Moving your business to a more secure environment
Date: 13/09/23 12:00
Prevention, Detection & Response: From security threats to resilience
Event date passed - Available on demand
Shield your data with cyber security awareness training
Staying secure with Microsoft 365
Housing Tech Conference 2023
Event date passed