• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to secondary navigation
  • Skip to primary sidebar
  • Skip to footer

Before Header

Call us today!  (888) 596-3998

  • Facebook
  • Twitter

Landon Technologies, Inc.

  • HOME
  • ABOUT
    • AREAS WE SERVE
      • FLORIDA
        • JACKSONVILLE
          • JACKSONVILLE MANAGED IT
          • JACKSONVILLE CYBERSECURITY
          • JACKSONVILLE IT CONSULTING
          • JACKSONVILLE CLOUD SERVICES
          • JACKSONVILLE IT COMPANY
          • JACKSONVILLE NETWORK CABLING
        • MIAMI
          • N. MIAMI BEACH MANAGED IT
          • MIAMI BEACH MANAGED IT
        • FORT LAUDERDALE
        • TAMPA
          • TAMPA IT SUPPORT
        • ORLANDO
          • ORLANDO MANAGED IT
        • ST AUGUSTINE
        • PALM COAST
        • ORMOND BEACH
      • GEORGIA
        • ATLANTA MANAGED IT
        • ALPHARETTA MANAGED IT
        • KENNESAW MANAGED IT
        • JOHNS CREEK MANAGED IT
        • MARIETTA MANAGED IT
        • NORCROSS MANAGED IT
        • ROSWELL MANAGED IT
        • SANDY SPRINGS MANAGED IT
        • SAVANNAH MANAGED IT
      • TEXAS
        • DALLAS MANAGED IT
        • HOUSTON MANAGED IT
      • CALIFORNIA
        • LOS ANGELES
      • NEW YORK
        • MANHATTAN
        • QUEENS
  • IT SERVICES
    • MANAGED IT SERVICES
      • REMOTE IT SERVICES
      • ENTERPRISE MANAGED IT
    • CYBERSECURITY
    • IT SUPPORT
      • REMOTE IT SUPPORT
    • NETWORK SERVICES
      • NETWORK MAINTENANCE
    • IT CONSULTING
    • DATA CENTER
    • DATA BACKUP
  • BLOG
  • CONTACT

Mobile Menu

  • HOME
  • ABOUT
    • AREAS WE SERVE
      • FLORIDA
        • JACKSONVILLE
          • JACKSONVILLE MANAGED IT
          • JACKSONVILLE CYBERSECURITY
          • JACKSONVILLE IT CONSULTING
          • JACKSONVILLE CLOUD SERVICES
          • JACKSONVILLE IT COMPANY
          • JACKSONVILLE NETWORK CABLING
        • MIAMI
          • N. MIAMI BEACH MANAGED IT
          • MIAMI BEACH MANAGED IT
        • FORT LAUDERDALE
        • TAMPA
          • TAMPA IT SUPPORT
        • ORLANDO
          • ORLANDO MANAGED IT
        • ST AUGUSTINE
        • PALM COAST
        • ORMOND BEACH
      • GEORGIA
        • ATLANTA MANAGED IT
        • ALPHARETTA MANAGED IT
        • KENNESAW MANAGED IT
        • JOHNS CREEK MANAGED IT
        • MARIETTA MANAGED IT
        • NORCROSS MANAGED IT
        • ROSWELL MANAGED IT
        • SANDY SPRINGS MANAGED IT
        • SAVANNAH MANAGED IT
      • TEXAS
        • DALLAS MANAGED IT
        • HOUSTON MANAGED IT
      • CALIFORNIA
        • LOS ANGELES
      • NEW YORK
        • MANHATTAN
        • QUEENS
  • IT SERVICES
    • MANAGED IT SERVICES
      • REMOTE IT SERVICES
      • ENTERPRISE MANAGED IT
    • CYBERSECURITY
    • IT SUPPORT
      • REMOTE IT SUPPORT
    • NETWORK SERVICES
      • NETWORK MAINTENANCE
    • IT CONSULTING
    • DATA CENTER
    • DATA BACKUP
  • BLOG
  • CONTACT
  • Facebook
  • Twitter

Leakware Ransomware: Are You Protected?

By //  by TechWriter Leave a Comment

You’ve heard about ransomware by now. Cybercriminals access and encrypt your data. You have to pay a “ransom” for the key to unlock it. Leakware is similar, but now the bad actors are threatening to post confidential information online if you don’t pay up.

When you think about it, there are probably many things your business wouldn’t want shared publicly. This could be your IP, your secret sauce recipe, your customer database with all the details, or financial data: the works.

The public sector is particularly at risk against leakware, also known as extortionware. Attackers threaten to publish confidential citizen data online. Healthcare organizations are also top targets, with the bad actors saying they will publish the stolen sensitive data online.

Leakware doesn’t just affect you and your business. It can hurt all the people whose data is leaked. That information makes citizens or customers more likely to be victims of fraud or identity theft.

As with ransomware, leakware is costly. Beyond the actual ransom paid, you could pay associated costs such as:

  • downtime
  • lost sales opportunities
  • angry customers
  • attack mitigation and recovery
  • damage to company brand reputation
  • penalties for unmet contractual obligations to customers
  • fines for non-compliance
  • fees for fraud protection offerings to affected individuals

“Nearly 3 out of 4 companies infected with ransomware suffer two days or more without file access.” — Acronis

Leakware – Planning and Prevention

Leakware is a more recent evolution of ransomware. In Johannesburg recently, hackers compromised passwords, and financial and personal population data. They demanded four bitcoins, or else they would reveal the stolen information and how they breached city systems.

The City of Johannesburg chose not to pay, and it’s unknown if the data was released or not.

Preventing a leakware attack requires the same precautions as ransomware. To start, use antivirus software and maintain a strong firewall. It’s important that you keep security software up to date.

Don’t ignore those notifications about system or software version upgrades! They can contain the patches you need to prevent vulnerabilities. Bad actors are always exploiting new methods of spreading malware. Security patching is the manufacturer’s effort to stay ahead of criminals.

It’s also a good idea to limit access based on the principle of least privilege. Authorize users for access only to data, software, or systems that they need based on their roles. When those responsibilities change, reconfigure the user’s access. This makes it more difficult for a bad actor to get all your data, because few people have that level of access.

Set up content scanning and mail server filters. At the same time, don’t rely on technology alone. Educate staff about the risk of social engineering and using public wireless internet. Make sure your people use a trustworthy Virtual Private Network (VPN) when off-site.

Keep good data backups, as well. We recommend the 3-2-1 approach. Keep three copies of your data. Backup one version to the cloud and have the other two stored on different devices (e.g. on your local computer and on a backup drive).

Leakware and ransomware are on the rise. No business or industry is immune. Protect your data.

Check out these other related Cyber Security topics that could be of interest to you!

  • Using Ad Blocking to Keep Cybercriminals at Bay
  • Are Your HIPAA Compliance Efforts Healthy?
  • Data Security Consulting

Call us at (888) 596-3998 for questions related to our services.

Filed Under: Cybersecurity

Looking for immediate answers to your questions?

You May Also Be Interested In:

A group of professionals discussing network configurations in a modern office setting.

How to Set Up a Corporate Network for Success

Efficient team of IT professionals working on fully managed IT services.

What is Fully Managed IT Services? – Your Personal IT Department

Split-screen image contrasting a composed IT professional monitoring system data under Managed Services with a stressed IT professional surrounded by disarrayed cables and broken equipment under Break-Fix model.

What is the Difference Between Managed Services and Break-Fix?

A technician inspecting network cables for maintenance.

How Often Should Network Maintenance Be Done?

Remote team collaborating on a virtual meeting.

Best Practices for Managing a Remote Workforce

A close-up of a woman's hand typing on a laptop keyboard with a cup of coffee beside it.

How to Provide Effective Technical Support for Remote Work

IT Management Meeting with Client

What Does an IT Managed Services Company Do?

An image of a modern data center with rows of servers and technicians working.

What is Data Center Support?

A team of network technicians carefully planning a network installation project in a business setting.

How Much is Labor to Install a Network? Understanding Network Installations

Previous Post: « Are Your HIPAA Compliance Efforts Healthy?
Next Post: The Advantages of Ad Blocking »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Follow Us

  • Facebook
  • Twitter

Search this Website

Latest Posts

  • A group of professionals discussing network configurations in a modern office setting.How to Set Up a Corporate Network for Success
  • Efficient team of IT professionals working on fully managed IT services.What is Fully Managed IT Services? – Your Personal IT Department
  • Split-screen image contrasting a composed IT professional monitoring system data under Managed Services with a stressed IT professional surrounded by disarrayed cables and broken equipment under Break-Fix model.What is the Difference Between Managed Services and Break-Fix?
  • A technician inspecting network cables for maintenance.How Often Should Network Maintenance Be Done?
  • Remote team collaborating on a virtual meeting.Best Practices for Managing a Remote Workforce
  • A close-up of a woman's hand typing on a laptop keyboard with a cup of coffee beside it.How to Provide Effective Technical Support for Remote Work

Footer

Get in Touch

Landon Technologies, Inc.
221 N. Hogan St. #358
Jacksonville, FL 32202

Main: (904) 647-2248
Toll Free: (888) 596-3998
Hours: Mon-Fri 8am-6pm

IT Services

Managed IT Services
Remote IT Support
Cybersecurity
IT Support
Remote Managed Services
IT Consulting

 

Quick Links

About Us
Tech News
Locations
Why Us?
Testimonials
Home

Company

Founded in 2005, Landon Technologies is a leader in IT Support Services. It’s simple, you get more for your money with us. Find out for yourself why our motto is “More Knowledge, More Experience”.

  • Facebook
  • Twitter
  • Privacy Policy
  • Terms of Service
  • Blog
  • Sitemap
· Copyright © 2005-2023 · Landon Technologies, Inc. ·