• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to secondary navigation
  • Skip to primary sidebar
  • Skip to footer

Before Header

  • Facebook
  • LinkedIn
  • Twitter

Landon Technologies

Technology Support Services and Solutions

  • HOME
  • ABOUT
  • IT SERVICES
    • MANAGED IT
    • CYBERSECURITY
    • IT SUPPORT
    • IT CONSULTING
    • BACKUP SERVICES
  • BLOG
  • CONTACT

Mobile Menu

  • Managed IT Services
  • Cybersecurity
  • About
  • Contact
  • Facebook
  • LinkedIn
  • Twitter

Leakware Ransomware: Are You Protected?

By //  by TechWriter

You’ve heard about ransomware by now. Cybercriminals access and encrypt your data. You have to pay a “ransom” for the key to unlock it. Leakware is similar, but now the bad actors are threatening to post confidential information online if you don’t pay up.

When you think about it, there are probably many things your business wouldn’t want shared publicly. This could be your IP, your secret sauce recipe, your customer database with all the details, or financial data: the works.

The public sector is particularly at risk against leakware, also known as extortionware. Attackers threaten to publish confidential citizen data online. Healthcare organizations are also top targets, with the bad actors saying they will publish the stolen sensitive data online.

Leakware doesn’t just affect you and your business. It can hurt all the people whose data is leaked. That information makes citizens or customers more likely to be victims of fraud or identity theft.

As with ransomware, leakware is costly. Beyond the actual ransom paid, you could pay associated costs such as:

  • downtime
  • lost sales opportunities
  • angry customers
  • attack mitigation and recovery
  • damage to company brand reputation
  • penalties for unmet contractual obligations to customers
  • fines for non-compliance
  • fees for fraud protection offerings to affected individuals

“Nearly 3 out of 4 companies infected with ransomware suffer two days or more without file access.” — Acronis

Leakware – Planning and Prevention

Leakware is a more recent evolution of ransomware. In Johannesburg recently, hackers compromised passwords, and financial and personal population data. They demanded four bitcoins, or else they would reveal the stolen information and how they breached city systems.

The City of Johannesburg chose not to pay, and it’s unknown if the data was released or not.

Preventing a leakware attack requires the same precautions as ransomware. To start, use antivirus software and maintain a strong firewall. It’s important that you keep security software up to date.

Don’t ignore those notifications about system or software version upgrades! They can contain the patches you need to prevent vulnerabilities. Bad actors are always exploiting new methods of spreading malware. Security patching is the manufacturer’s effort to stay ahead of criminals.

It’s also a good idea to limit access based on the principle of least privilege. Authorize users for access only to data, software, or systems that they need based on their roles. When those responsibilities change, reconfigure the user’s access. This makes it more difficult for a bad actor to get all your data, because few people have that level of access.

Set up content scanning and mail server filters. At the same time, don’t rely on technology alone. Educate staff about the risk of social engineering and using public wireless internet. Make sure your people use a trustworthy Virtual Private Network (VPN) when off-site.

Keep good data backups, as well. We recommend the 3-2-1 approach. Keep three copies of your data. Backup one version to the cloud and have the other two stored on different devices (e.g. on your local computer and on a backup drive).

Leakware and ransomware are on the rise. No business or industry is immune. Protect your data. If you need help with your prevention efforts, give us a call 888-596-3998.

Filed Under: Cybersecurity, Information Security, Internet, Internet Security, Ransomware

Looking for immediate answers to your questions?

You May Also Be Interested In:

Making Telehealth Security Top Priority

Healthcare Providers Must Prepare for IT Disasters

Prevent Data Silos for Business Success

Tech Help for New Year’s Resolutions

Is Healthcare Compliance Good Enough?

Why Life is Easier With Managed Services

Logitech MK235 Wireless Keyboard and Mouse – Buy Now

What You Need to Know About Home Automation Services

All You Need to Know About Password Policy Best Practices

Previous Post: « Are Your HIPAA Compliance Efforts Healthy?
Next Post: The Advantages of Ad Blocking »

Primary Sidebar

RECENT POSTS

Making Telehealth Security Top Priority

The use of telehealth has been growing rapidly over the past …

Healthcare Providers Must Prepare for IT Disasters

Healthcare professionals regularly handle the worst. Whether its …

Prevent Data Silos for Business Success

The volume of data in the world was predicted by International …

Tech Help for New Year’s Resolutions

Making New Year’s resolutions is a familiar habit in the Western …

Is Healthcare Compliance Good Enough?

The healthcare industry is a top target for cybercriminals. …

Why Life is Easier With Managed Services

That smile of relief when we fix someone’s technology is a gift …

Logitech MK235 Wireless Keyboard and Mouse – Buy Now

Landon Technologies, Inc is a participant in the Amazon …

What You Need to Know About Home Automation Services

Looking for Home Automation Services? Fifteen years ago, smart …

All You Need to Know About Password Policy Best Practices

News of a big brand suffering a data breach is all too common …

Will Office 2010 Still Work After 2020 and Beyond?

The question: Will Office 2010 still work after 2020? It may …

Here Are The Best Technology Solutions for Small Business in 2021

For many of us, 2021 can’t come soon enough, and we're hoping …

Why Does a Managed IT Support Company Beat a Break-Fix Approach?

Computers break at challenging times. Always. Your employees …

What To Know About Having a Small Business Cyber Security Plan

Cybersecurity attacks on big-name brands or governments are …

Best Benefits of Windows Virtual Desktop for Businesses

The days of doing all our work in the office are gone for most …

Get Your IT Ready for Holiday Shopping

Holiday shopping will have a new look this year. Many retailers …

Keep Your Firmware Safe and Secure

Most of us can differentiate between hardware and software. But …

Facing the Five Top Cloud Computing Fears

The public cloud service market is growing. Software, …

3 Things Your IT Support Partner Wishes You Did

Want to get in the good books of your IT support team? It’s …

What is the Cloud?

You may have come across people talking about ‘cloud’ storage …

Want to Be Anonymous Online? Incognito v. VPN

Maybe you want to be a little mysterious, but more likely you …

Footer

Follow Us

  • Facebook
  • LinkedIn
  • Twitter

Call Us: (888) 596-3998
Hours: Mon-Fri 8am-6pm

Our Services

  • Managed IT Services
  • CyberSecurity Consulting
  • IT Support Services
  • Network Installations
  • Network Support

Areas We Service

  • California
  • Florida
  • Georgia
  • New York
  • Texas
  • Privacy Policy
  • Terms and Conditions
  • Make a Payment
  • Blog
  • Sitemap

Site Footer

· Copyright © 2005-2020 · Landon Technologies, Inc. ·
»
«