SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
WHAT IS RANSOMWARE??
RANSOMWARE IS ONE TOPIC
THAT DOESN’T SEEM TO BE LOSING
MOMENTUM ANY TIME SOON.
Every day, companies across all industries are
paying ransom to retrieve their data from the
clutches of malicious hackers. Why? Because
ransomware! What’s that you ask? Great
question! Here are the facts about
ransomware to which every business owner
should know...
Ransomware comes in quite the variety pack these
days, but let’s start by cancelling out some definitions.
RANSOMWARE IS NOT…
‘Malware’ is an umbrella term used to refer to a variety of forms of hostile
or intrusive software, including computer viruses, worms, trojan horses,
ransomware, spyware, adware, scareware, and other malicious programs. It can
take the form of executable code, scripts, active content, and other software.
RANSOMWARE ≠ MALWARE
RANSOMWARE ≠ RANSOM
Ransom is the practice of holding a prisoner or item to extort money or property
to secure their release, or it may refer to the sum of money involved. In an early
German law, a similar concept was called weregild.
While ransomware is a form
of malware, it’s definitely
unique in what it does.
Sprinkle in some ‘ransom’
and you’ve got a malicious
virus that keeps your data
encrypted until ransom
is paid (usually in bitcoins).
SO AS AN SMB, WHY
SHOULD YOU CARE?
THE NUMBERS TELL
A DARK TALE!
SO WHAT’S THE CURRENT
STATE OF RANSOMWARE?
Globally, over 317M new
pieces of malware were
created in 2015. While many
attacks go unreported, there
were still about 1M reports of
attack each day.
Source: CNN
IT’S PRETTY CONTAGIOUS!
As opposed to individual
devices, more ransomware
attacks are spreading
across entire networks. The
healthcare industry has
recently experienced this.
Source: CIO
AND IT’S NOT CHEAP TO RECOVER FROM!
In 2016 alone, more
than $200 million
has been paid out
by victims.
Source: CNN
NOT ONLY IS RANSOMWARE BECOMING MORE
COMMON, BUT IT’S ALSO EXPENSIVE AND CAN
HALT AN ENTIRE SYSTEM. As an SMB, it’s painful to your
bottom line. We decided to ask
some IT professionals for
their thoughts and noticed
a common trend…
BUSINESS CONTINUITY.
WHILE BUSINESS CONTINUITY CAN’T PREVENT
RANSOMWARE FROM ATTACKING, IT CAN
PREVENT IT FROM SUCCEEDING!
When it comes to ransomware, it’s not
a matter of IF but WHEN.
Business continuity will give you
access to your captive data.
No hostages here!
CODY ARNOLD
Backup Engineer
Bizco Technologies
Ransomware is a threat to your business
and your ability to function. Not having a
proper backup/disaster recovery solution in
place could be crippling.
Imagine losing all of your data unless you pay a ransom of
hundreds or thousands of dollars in a currency you don’t
understand. You may pay the ransom and still not get your
data back. This is the new kind of kidnapping. Don’t pay the
ransom and your data is lost forever. You need an insurance
policy to prevent it.
MICHAEL PATRICK
Solutions Architect
Mirazon Group
SEBASTIAN USAMI
Systems Engineer
BEK Inc.
Imagine getting locked out of your computer — not because
you forgot your login credentials, but because of a virus. Now
imagine having to pay cybercriminals a hefty sum to regain
access to all your files, customer data and confidential
business information - no good can come of this.
Ransomware is currently the most popular, and nefarious,
trend in malicious software. It is deployed with the intention
of blocking access to your file system, and impeding your
ability to do business, by encrypting data until a specified
sum of money is paid to those holding it hostage.
FRANK SLATTERY
General Manager
TeamLogic IT
!
!
!
!
!
!
!
!
!
!
!
!
!
!
DALE SHULMISTA
Owner/Founder
Invenio IT
Ransomware is a type of malware that holds your data hostage
until a demand is met. High profile attacks are making headlines
and as a result, businesses around the world are increasing their
cybersecurity–however, with new strains popping up daily, I’d like
to see businesses consider another approach for protection. . .
intelligent business continuity.
Now that you have the basic jist of ransomware, you understand the
threat facing your business without the proper defense systems in
place. Not just anti-virus protection, but backup and recovery tools
in case ransomware makes it past the front lines of defense. To learn
more about protecting your business from ransomware, speak with your
managed services provider.
For more on ransomware, check out the eBook,
“The Business Guide to Ransomware”.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Ransomware
Ransomware Ransomware
Ransomware
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Wannacry
WannacryWannacry
Wannacry
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
WannaCry ransomware attack
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attack
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Ransomeware
RansomewareRansomeware
Ransomeware
 
Malware
MalwareMalware
Malware
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ransomware attacks
Ransomware attacksRansomware attacks
Ransomware attacks
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ransomware
RansomwareRansomware
Ransomware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Malware and security
Malware and securityMalware and security
Malware and security
 

Similar a What is Ransomware?

Similar a What is Ransomware? (20)

What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Prevent Phishing Attacks – CRI Advantage
Prevent Phishing Attacks – CRI AdvantagePrevent Phishing Attacks – CRI Advantage
Prevent Phishing Attacks – CRI Advantage
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
 
Tip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksTip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacks
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
The Most Common Enterprise Malware and how to identify them
The Most Common Enterprise Malware and how to identify themThe Most Common Enterprise Malware and how to identify them
The Most Common Enterprise Malware and how to identify them
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
Defending Against Ransomware.pdf
Defending Against Ransomware.pdfDefending Against Ransomware.pdf
Defending Against Ransomware.pdf
 
WHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareWHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of Ransomware
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your Business
 
Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?
 

Más de Datto

CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
Datto
 

Más de Datto (20)

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. Public
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
5 Steps to Secure Google Drive
5 Steps to Secure Google Drive5 Steps to Secure Google Drive
5 Steps to Secure Google Drive
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

What is Ransomware?

  • 2. RANSOMWARE IS ONE TOPIC THAT DOESN’T SEEM TO BE LOSING MOMENTUM ANY TIME SOON. Every day, companies across all industries are paying ransom to retrieve their data from the clutches of malicious hackers. Why? Because ransomware! What’s that you ask? Great question! Here are the facts about ransomware to which every business owner should know...
  • 3. Ransomware comes in quite the variety pack these days, but let’s start by cancelling out some definitions. RANSOMWARE IS NOT…
  • 4. ‘Malware’ is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. RANSOMWARE ≠ MALWARE
  • 5. RANSOMWARE ≠ RANSOM Ransom is the practice of holding a prisoner or item to extort money or property to secure their release, or it may refer to the sum of money involved. In an early German law, a similar concept was called weregild.
  • 6. While ransomware is a form of malware, it’s definitely unique in what it does. Sprinkle in some ‘ransom’ and you’ve got a malicious virus that keeps your data encrypted until ransom is paid (usually in bitcoins). SO AS AN SMB, WHY SHOULD YOU CARE? THE NUMBERS TELL A DARK TALE!
  • 7. SO WHAT’S THE CURRENT STATE OF RANSOMWARE? Globally, over 317M new pieces of malware were created in 2015. While many attacks go unreported, there were still about 1M reports of attack each day. Source: CNN
  • 8. IT’S PRETTY CONTAGIOUS! As opposed to individual devices, more ransomware attacks are spreading across entire networks. The healthcare industry has recently experienced this. Source: CIO
  • 9. AND IT’S NOT CHEAP TO RECOVER FROM! In 2016 alone, more than $200 million has been paid out by victims. Source: CNN
  • 10. NOT ONLY IS RANSOMWARE BECOMING MORE COMMON, BUT IT’S ALSO EXPENSIVE AND CAN HALT AN ENTIRE SYSTEM. As an SMB, it’s painful to your bottom line. We decided to ask some IT professionals for their thoughts and noticed a common trend… BUSINESS CONTINUITY.
  • 11. WHILE BUSINESS CONTINUITY CAN’T PREVENT RANSOMWARE FROM ATTACKING, IT CAN PREVENT IT FROM SUCCEEDING! When it comes to ransomware, it’s not a matter of IF but WHEN. Business continuity will give you access to your captive data. No hostages here!
  • 12. CODY ARNOLD Backup Engineer Bizco Technologies Ransomware is a threat to your business and your ability to function. Not having a proper backup/disaster recovery solution in place could be crippling.
  • 13. Imagine losing all of your data unless you pay a ransom of hundreds or thousands of dollars in a currency you don’t understand. You may pay the ransom and still not get your data back. This is the new kind of kidnapping. Don’t pay the ransom and your data is lost forever. You need an insurance policy to prevent it. MICHAEL PATRICK Solutions Architect Mirazon Group
  • 14. SEBASTIAN USAMI Systems Engineer BEK Inc. Imagine getting locked out of your computer — not because you forgot your login credentials, but because of a virus. Now imagine having to pay cybercriminals a hefty sum to regain access to all your files, customer data and confidential business information - no good can come of this.
  • 15. Ransomware is currently the most popular, and nefarious, trend in malicious software. It is deployed with the intention of blocking access to your file system, and impeding your ability to do business, by encrypting data until a specified sum of money is paid to those holding it hostage. FRANK SLATTERY General Manager TeamLogic IT ! ! ! ! ! ! ! ! ! ! ! ! ! !
  • 16. DALE SHULMISTA Owner/Founder Invenio IT Ransomware is a type of malware that holds your data hostage until a demand is met. High profile attacks are making headlines and as a result, businesses around the world are increasing their cybersecurity–however, with new strains popping up daily, I’d like to see businesses consider another approach for protection. . . intelligent business continuity.
  • 17. Now that you have the basic jist of ransomware, you understand the threat facing your business without the proper defense systems in place. Not just anti-virus protection, but backup and recovery tools in case ransomware makes it past the front lines of defense. To learn more about protecting your business from ransomware, speak with your managed services provider. For more on ransomware, check out the eBook, “The Business Guide to Ransomware”.