Site icon Panda Security Mediacenter

Panda Security launches its Practical Security Guide for avoiding cyberextortion in businesses

avoiding cyberextortion

In order to stop an organization becoming a victim of cyber extortion a combination of security technology, company policy and training are the most important factors to avoid attack by cybercriminals.

This is why Panda Security has launched its Practical Security Guide to Prevent Cyber Extortion, in which it highlights that European organizations suffer the highest number of sensitive data thefts.

Cyberextortion: a limitless threat

In recent years, the massive growth in cyberattacks has led to companies devoting more time and resources to combatting the problem, and finding a security solution that guarantees greater control of their files.

The majority of attacks that use this type of extortion have different origins: 39% come from insecure or fraudulent websites, 23% from programs downloaded from the Internet, and 19% come from infected emails or attached documents.

One of the most prevalent forms of cyberextortion is Ransomware, which starts with the cybercriminals installing a Trojan program whose purpose is encrypting vital company information. The victim is then advised their information is lost and decryption will only be provided after payment of a ransom (normally by Bitcoin). Although payment doesn’t always guarantee that the company will be able to retrieve their files, or that they won’t become a victim again in the future.

Type of malware: How do they affect the companies?

Businesses are considered the main target of this type of malware, as its aim is to cause as much damage as possible:

Panda Security’s 5 tips for avoiding cyberextortion

  1. Advise your users: keep them up to date with the risks that are associated with not having a good security solution
  2. Set out rules for online use at work: assign a series of rules that control the reputation of websites that access is granted to.
  3. Design a solution to your needs: make sure you have the right solution for your business, and keep it updated.
  4. Establish protocols: control installation and running of software. Also, examine what applications have been installed periodically.
  5. Always update: set out an update policy and block certain applications on your computers.
[button link=”https://www.pandasecurity.com/en/mediacenter/src/uploads/2016/02/Cyberextortion_Guide.pdf” color=”green1″ icon=”” size=”medium”]DOWNLOAD CYBEREXTORTION GUIDE[/button]
Exit mobile version