Latest Tech Feeds to Keep You Updated…

How Digital Extortion Impacts Today’s Enterprises

By now, many enterprise decision-makers are familiar with the concept of digital extortion, particularly in the form of ransomware. These encryption-based attacks lock users out of their sensitive and valuable data, applications and operating systems. Attackers demand a ransom in the form of untraceable digital currency for the decryption key – which may or may not actually be delivered upon payment.

Ransomware attacks have been impacting organizations for a few years now. However, this isn’t the only form of digital extortion in use today. As with other attack styles, hackers are becoming increasingly advanced in their preparations and malicious software capabilities.

As digital extortion attacks continue to increase, it’s imperative that IT leaders and executives ensure they are aware of these kinds of threats and the impacts they can have on overall company reputation as well as relationships with partners and customers.

Digital extortion explained: Generating profits for cybercriminals

A main reason behind the rise of digital extortion – and predictions on the part of security experts that these instances will only expand in the near future – is the fact that these attacks can be incredibly lucrative for hackers.

Ransomware, and other digital extortion attack styles, which we’ll delve into later on, all have a common denominator: high profit potential for cybercriminals. When enterprises and individual users are prevented from accessing their most important files and data – and particularly when these key assets are not backed up in a second location – victims are forced into paying attackers to lift strong encryptions and regain access.

Unfortunately, past ransomware attacks have demonstrated that just because a hacker is paid, doesn’t mean the attack will end. In some instances, including during the widespread WannaCry attacks, victims paid ransoms but never received a decryption key – or even a response – from cybercriminals. In other instances, once the ransom is paid, hackers will demand a second, higher ransom with the promise that access will be restored.

Due to these and other reasons, digital extortion has become a particularly dangerous and damaging threat to enterprises.

“Digital extortion is one of the most lucrative ways cybercriminals can profit in today’s threat landscape,” Trend Micro security researchers pointed out. “Many have fallen victim to this particularly particular scheme and been bilked out of their money – from ordinary users to big enterprises.”

Digital extortion of the past: DoS pave the way

Although current awareness of digital extortion attacks is most closely tied with ransomware infections, this style of making profit was also being used in combination with another familiar approach – denial-of-service attacks. And as Trend Micro’s Digital Extortion: A Forward-Looking View report notes, this style of extortion has been utilized by cybercriminals for over a decade, and hackers can be very insensitive in their approach.

Good morning …we hope you’ve been enjoying the 100+ Gbps DDoS. To make it stop, please pay 30 bitcoins to the following wallet…” an example in the report stated.

As with ransomware attacks, the key here is to prevent access and coerce victims into payment. By bombarding key systems – typically consumer- or client-facing platforms – with high traffic volumes, they become inaccessible.

While not a top favorite any longer, some hackers still leverage DoS in conjunction with extortion in order to encourage payment on the part of victims. After all, a brand’s website that is inaccessible for even a few hours can translate to significant lost opportunities to connect with potential customers and foster business for today’s enterprises.

Ransom notes like this are often sent to businesses and consumers alike when hackers access their data.

Impacts to business reputation: Fake online reviews

In the current age, online reviews mean a lot to consumers and the buying decisions they make. In fact, Inc. Magazine reported that not only do 91 percent of individuals read online reviews, but 84 percent trust them as much as a personal recommendation from a friend.

This is no secret to hackers, who have used this knowledge to demand payment from businesses that rely on online reviews.

Did you notice how all the hotels in your chain are lately getting very many negative reviews? If you want this problem to go away, follow the instructions…” noted an example in Trend Micro’s digital extortion report.

Often, hackers will work to be very timely in these types of extortion, targeting a company with an upcoming product release or other launch. In these instances, more consumers are looking for reviews and information, and cybercriminals work to negatively impact public perception. In some situations, like the example above, attackers will offer to stop the review spamming in exchange for payment, or may even go further and offer to retract negative reviews once the ransom is paid.

Supply chain disruptions: Machine hijacking

As the Digital Extortion: A Forward-Looking View report shows, some types of extortion go beyond the digital realm and impact operations in the physical world. Such is the case with equipment or machine hijacking, where cybercriminals hack into the software systems used to control and manage heavy machinery and/or manufacturing equipment.

In these events, hackers bring down supply chain operations, preventing production, manufacturing, shipping, distribution and other key processes, demanding payment in exchange for returned access to equipment. This can topple business activity for an organization, and have a considerable impact on its reputation and relationships with partners across the supply chain, as well as customers.

Uber extortion: A real-world case

Overall, extortion-style attacks can impact nearly anyone, including high ranking company officials, political figures, celebrities, individual users and beyond. Unfortunately, more often than not, even when payment to cybercriminals is made and a quasi-resolution reached, the damage to the victim or organization is already done.

Uber learned this the hard way in 2016, when it was discovered that hackers breached the company’s systems and made off with a considerable amount of personal data belonging to 57 million app users. Although the ride-sharing platform paid off cybercriminals to the tune of $100,000 to keep the matter quiet and prevent further data leakage, a change in management within Uber shifted this decision about a year later.

Uber representatives disclosed the hack and subsequent extortion to the public, which was generally met with negativity that the organization had waited so long to make customers aware of the potential danger surrounding their stolen data.

Mitigating extortion attacks

While attacks like this can impact any user or organization, there are a few best practices that can be leveraged to reduce the chances of these instances. The first step, of course, is awareness of this attack style in the threat landscape – advanced knowledge can help users strengthen protections proactively.

In addition, it’s imperative to properly safeguard sensitive personal and business information and to leverage strong authentication credentials in this manner.

To find out more, check out Trend Micro’s Digital Extortion report today.

The post How Digital Extortion Impacts Today’s Enterprises appeared first on .

The Essential Guide for Mac Security | Avast

Macs are beautiful machines, in both appearance and performance. The sleek designs, intuitive OS, trend-setting apps, and, yes, the anti-malware security built into the platform, make them among the most cherished items possessed by their owners.

A game that cryptojacks, a town under seige, and more data breaches | Avast

Steam game found to be secretly cryptomining

“Malicious cryptomining has become so popular among cybercriminals that it has earned its own name: cryptojacking,” states Avast security evangelist Luis Corrons. “It is one of the most popular ways to make easy money nowadays, and we have seen in the last months how thousands of vulnerable websites have been hacked to make their visitors cryptomine, or using ads to push cryptomining JavaScript.”

SamSam ransomware can shut your city down | Avast

SamSam ransomware was first spotted in the digital wild back in 2015. Since then, its purveyors have racked up approximately $6M in extorted ransom money, experts surmise, and its diabolical reign shows no sign of slowing. The malware continues to be improved upon to make it sneakier, with its newest version encrypting files late at night, hoping to infect the system when the user is away from the screen. Additionally, the SamSam attacks all seem strategic and deliberate, as opposed to automated outbreaks, making them some of the most feared and destructive cyberattacks active today.

Cybercriminals and the risks to small business

Why do cybercriminals target small businesses so much? And what can SMBs do to protect themselves?

Malicious hackers, better known as cybercriminals, are in the news a lot. From ransomware perpetrators extorting money to anonymous’ political hacktivism, cybercriminals are more active than ever – exploiting an increasingly connected world. But what are the risks to small businesses? And what can small business owners (SMBs) do to protect themselves from these malicious individuals and groups?

What cybercriminals do

It doesn’t take long to find a site or network with poor security. Threat actors don’t spend days or weeks trawling the internet looking for sites to hack. They create code that ceaselessly scans for weaknesses, flaws and open doors, such as weaknesses in accounting software, or social media.

A single hack may only result in a few hundred sets of credit card details. But that sensitive data is still highly desirable because of its value on the black market or to the business owner who will pay a lot of money to get it back.

Even if the cybercriminal doesn’t sell or share the data they steal directly, they can use it to set up other accounts online and create false or duplicate identities based on real people – your staff, your customers, your partners. These identities are then used to commit fraud or other crimes. Or simply to cause disruption and havoc.

Why target SMBs?

The evidence is clear. Regardless of company size or the cybercriminal’s objective, the main reason many small businesses are hacked so easily is because of the low-level security measures they have in place. A shift in attitude is required.

  • SMBs are attractive to bad actors because they tend to have weaker online security
  • If you have any Fortune 500 companies as customers, your company is an even more enticing target, as it can act as an entry point for cyberattackers
  • Perpetrators can easily steal information and hold it for ransom.

SMB negligence?

What is not so clear is why businesses are still leaving their keys in the ignition. Believe it or not, the most popular passwords in 2017 were still ‘123456’ and ‘password’.

Likewise, when a business owner thinks ‘I’m a small business, malicious attackers won’t be interested in me’, they may not bother investing in antivirus software.

If this is the case, they’re letting their guard down on at least two counts: a misguided belief and much weaker security. Both of these increase the attraction and ease with which cybercriminals can break in.

“One study reported that in 2017 only 17% of small businesses in the US used antivirus software.”.


A change in attitude

Think of your business as being in a constant state of compromise and flux. This doesn’t have to be as pessimistic or alarming as it sounds. It’s a pragmatic approach based on the recognition that trying to predict and defend against all possible attacks at all possible times is extremely resource intensive and costly. Rather, it is best to accept that a certain amount of compromise is always likely.

With that in mind, you can then maximize and allocate whatever resources are available in tackling the most likely attacks. This represents a constructive and helpful shift in attitude. It means you accept that you can’t always foresee every attack and instead you take steps to minimize the impact in case a big attack happens.

What can you do to protect yourself?

In a short amount of time, by carrying out a few straightforward measures, you can easily raise your level of security against the most common threats, without an extravagant cost to your business.

We recognize that small businesses owners can’t always afford dedicated IT support or commercial levels of antivirus. That’s why we created AVG Business’ multi-layered security antivirus software designed specifically for small businesses’ needs and budget.

Read more about AVG Business antivirus software.

As well as ensuring you have an up-to-date, high-quality antivirus, it is essential to train your employees to recognize threats, update their software and know what to do if they think they’ve been compromised.

Read our infographic article that details all of the points of entry cybercriminals can use to gain access to your business. This includes information on:

  • Mobile devices
  • Passwords
  • The cloud
  • Emails
  • Websites
  • Two-factor authentication
  • Public Wi-Fi

The price of protection vs the cost of attack: antivirus for small business

Running a business is a challenge, especially when simple decisions can have an impact on your bottom line. That’s why we’re taking the cyber protection conversation back to basics: comparing the price of antivirus to the cost of an attack.

Fail to prepare, prepare to fail

Small business (SMB) owners know the importance of being prepared. Predicting the future is hard at the best of times, so business owners need to prepare for the impact of events affecting business continuity on everything from reputation and cash-flow to productivity and profit. For example, managers will account for how a long-term sickness in the team or a sudden hike in supply cost can unbalance their books so contingency costs can be factored into budgets.

How can small businesses prepare for a cybersecurity incident?

While 60% of small businesses have been a victim of cybercrime, most small businesses won’t buy any cyber protection in the upcoming financial year. So, considering the multiple entry points that a business offers to hackers, why is the cost of a cyberattack not a priority for SMBs?

The answer may lie in the lack of resource in small business. While large organizations often have entire IT departments, start-ups and medium-sized businesses usually have other priorities – from cash flow to winning new business. So, when cash is tight, why fork out on cyber protection?

This article will answer that question.

By helping you to compare the cost of protection with the potential cost of a cyberattack, you will be armed with the knowledge you need to make the right decision for your business.

The cost of a security breach

Industry experts Cybersecurity Ventures have predicted that cybercrime will cost $6 trillion a year by 2021. This figure may sound alarming, but many SMBs fall victim to the idea that ‘we’re too small to be targeted’. The truth is that small business are targeted, and usually for the very reason that they are less protected than larger companies and therefore an easy target.

A survey conducted by the Federation of Small Businesses (FSB) in 2016 showed that, on average, a small business will be attacked four times every two years, costing them £3000 ($4,200).

Ransomware is an attack that holds sensitive data hostage until a payment is made – and it’s on the rise. By 2019, a business will fall victim to a ransomware attack every 14 seconds, compared to every 40 seconds in 2016. The average ransom asked for is about £3,000 per user ($4,200), and almost half the ransomware attacks in 2016 spread to at least 20 other users. If your company has 20 staff, that’s a hefty £60,000 you could be coughing up.

The cost of an attack to a business is not only immediate, it could have a long-term effect on your business. Do consumers or clients want their information to be held by a company that has had a data breach? According to the US Securities and Exchange Commission, six out of 10 small businesses close six months after a cyberattack.

Your employees also may have something to say. Hackers behind a phishing attack in early 2017 targeted businesses and requested employee’s personal tax information be sent to them. The attack was clever – and made to look like it was from an executive or official. More than 120,000 employee tax forms were handed over. Phishing attacks are the most common form of cyberattack, affecting half of small businesses.


The cost of antivirus for business

When money is tight, small business owners can’t be blamed for balking at the prospect of spending thousands a year on a security solution – after all, how often does an attack even happen to a small business? (answer: 52% of small businesses suffered a cyberattack in 2017).


However, most cybersecurity companies offer products specifically developed for small businesses, alongside their consumer and big business products. Consumer versions are consistently priced per device, no matter how many you buy, whereas SMB antivirus packages offer cost effective scaling options for cheaper buying in bulk.

Business protection ranges in price depending on the features and quality of the antivirus software. For example, you can expect to pay about £30-£40 ($42-$56) per year for business antivirus protection on one computer. The cost per computer then reduces to around £20 per device as you scale to cover more PCs. So, if you have a business with eight computers, you can expect to pay about £160 ($222) per year. In contrast, buying premium consumer licenses would cost upwards of £550 ($763.)

Most standard licenses last between one and three years and the best antivirus usually includes internet security, a firewall and remote management. Basic offerings may be advertised for free, but always check the features included in the free version as this is unlikely to offer the level of protection necessary to fully protect your business.

Cost of antivirus protection vs cost of a cyberattack

Reading all these facts and stats can be overwhelming, especially for a small business owner simply wanting to ‘do the right thing.’ So, to make the information easier to digest, here’s a side by side comparison.


A colleague receives an email with a link which, when clicked, downloads a virus that impersonates email accounts of the staff in your business. Over the next few weeks, unbeknownst to you, the hacker responsible for the virus siphons information that allows them to access your business bank accounts and customer database.

Over the next week, the criminals steal almost £400,000 from your account (similar to the case of construction firm PATCO, who lost $545,000 and were reimbursed less than half of this by the bank) and corrupt your customer database (as happens in a fifth of cases.)

When you discover the attack, you must stop operating immediately to investigate the incident and check for further breaches. The loss in revenue is about £30,000.

After the attack, the team works extra hours contacting customers to explain the situation and ensure the details stored on them are correct. This costs the business about £5,000 in additional working hours and other admin costs. At the same time, a potentially lucrative business client pulls out as they are concerned about their data being compromised. You lose £6,800 from the collapse of this deal.

Total cost to your business: £441,800 ($616,824.)

Antivirus protection

You buy antivirus protection for your business’ 11 computers for the next five years.

Total cost to your business: £1,650 ($2,317)


Antivirus is an annual cost that’s probably less than you think, and one that you can easily account for in your yearly budget planning. An attack may never happen to you – but cybercrime is on the rise, and if you are attacked, could you easily recover? How many customers might you lose after an attack before you can no longer balance your books? How important to you is continuity of service?

There is no simple answer when it comes to weighing up decisions around business spending, but from what you’ve learned here, you should be feeling more empowered and more informed.

If you’re interested in learning more about security solutions for small business, you can compare our solutions here.

Ransomware – What it is, how to avoid it and what to do if it gets you

Ransomware has been all over the news since 2015. You’d think we would all know how to deal with it and the fad would be dying by now.  Well, that’s what I would think.  It turns out that ransomware generates a lot of cash for criminals, an estimated $1 billion in 2016.  It also has […]

Protecting your business from the next ransomware attack

With more than 120 million ransomware samples in 2015 alone, now as of 2017, it has become one of the fastest growing and lucrative threats to businesses on the web.

Ransomware disguises itself by hiding inside of email and website links and then hijack your computer until you agree to pay the ransom. Prevention is possible and important to avoiding these types of attacks. Our AVG Business survival guide will help you protect yourself and your business before the next threat occurs.


Photo credit: Unsplash photographer Illya Pavlov

Six security lessons for small business from 2016

Historians will look back at 2016 as the year that cybersecurity moved from being an important issue to a critical one on both sides of the Atlantic. In the United States, the two main presidential candidates traded insults over email security and claims that Russian hackers were trying to influence the election’s outcome by leaking stolen data.

Democrat candidate Hillary Clinton was under fire for allegedly using a private email server for classified documents while working as Secretary of State. Republican candidate Donald Trump was accused of encouraging foreign powers to hack his rival and publish whatever incriminating or embarrassing information they could find. But both candidates agreed that cyber security was a vital issue of national security.

In Britain, the Chancellor of the Exchequer, Philip Hammond, unveiled a new £1.9billion cybersecurity strategy to ensure the country could “retaliate in kind” against any digital attacks on national infrastructure like the electricity grid or air traffic control systems. But behind the politics, what were the real security lessons of 2016?

  1. The Internet of Things is vulnerable

An attack on Dyn, one of the companies behind the infrastructure of the internet, in early October revealed how the new generation of connected devices has created fresh opportunities for hackers. Major websites – including Netflix, Twitter, Spotify and Amazon – all came under attack. Security analysts revealed that compromised Internet of Things (IoT) devices such as digital cameras and video recorders had been the entry point for hackers. A basic security vulnerability with these devices – factory-default security settings – had allowed hackers to disrupt the internet infrastructure.

The message for manufacturers, consumers and businesses was self-evident: The Internet of Things needs an urgent security upgrade.

  1. Rise and rise of ransomware

You can trace the early origins of ransomware to the days of pop-up bogus “official messages” warning that your computer has been infected, or that you’d been caught doing something illegal. Today, the tactic has evolved into attempts to lock businesses out of their own network, critical files or services until money is handed over. What has made 2016 different is a step-change in the scale of the problem.

The analyst firm Gartner reported $209 million was extracted through ransomware attacks in the first three months of 2016, compared to $24 million that was extracted from US businesses in 2015. Businesses, hospitals and universities have all been targets and an increasing number of victims are paying up to regain control of their network or vital files. A recent survey also revealed that 1 in 3 businesses were clueless about ransomware: either not knowing what it was at all, or misunderstanding what it was.

The lesson for business is clear: understand what it is and its possible impact on your business, and have a plan in place that outlines what to do if a ransomware attack happens.

  1. Rise of encryption

One of the tech stories of the year was the clash between Apple and the FBI over access to data in the iPhone of one of the San Bernardino bombers. The public debate about privacy and security that followed saw the instant messenger (IM) service WhatsApp decide to add end-to-end encryption to users’ messages.

In theory, the move meant that no-one apart from the sender and intended recipient can read messages – not even WhatsApp itself. The move put pressure on other IMs, email services and social channels to reassure users that messages were snoop-proof and encrypted. The need to use encryption to secure your data has never been stronger. Cybercriminals are becoming more sophisticated and as they do so we need to step up and take proactive steps to stay ahead of them.

There was a two-fold lesson for businesses: firstly, to understand how data was being shared inside and outside their organization; secondly, to consider encrypting the most sensitive files.

  1. Reinvention of the log-in

The password isn’t quite dead yet, but 2016 saw a broad effort to push users towards more secure log-in procedures. Both Google and Apple rolled-out improvements to multi-factor verification and authorization –using multiple devices or security steps to approve a key action or transaction.

A growing number of banks and financial institutions began testing biometric verification – fingerprint and voice recognition – seeing it as an important way to reduce fraud. The lesson of the year was that the days of logging in with just a username and password are coming into an end.

Businesses need to think of how they can create and encourage employees and customers to use more secure pathways to access account, order or profile information.

  1. The threat from inside

Reports about cybersecurity tend to be dominated by headlines about hackers, whether individuals, criminal gangs or countries testing other nations’ cyber defences. Looking back at some of the biggest security breaches of 2016 you’ll find a common factor: the loss of data involved someone from inside the business.

In some cases, the leak started with the loss or theft of a company laptop, memory stick or mobile phone. In others, employees shared data they shouldn’t have, either accidentally or by deliberately trying to sell confidential information. According to the Ponemon Institute, the cost to businesses of clearing up data leaks is going up year after year.

The lesson for businesses is to ensure that staff understand security risks, have regular training, and that procedures are in place to cut the chance of confidential data leaking out. Restricting access to only those employees that need it also helps businesses reduce the risk of loss of data and reputation.

  1. No-one is immune

2016 was the year that saw millions of user account details stolen from some of the best-known tech brands – Yahoo!, LinkedIn, Twitter – go up for sale on the Dark Web. It was also the year that the presidential campaign put the spotlight on government security – with a stream of leaked data and questions about unsecure email servers allegedly being used for classified information.

But don’t be fooled into thinking that big brands or big targets are the only game in town. Research by the Federation of Small Businesses in the UK in 2016 found that two out of three small firms had been victims of cybercrime in the previous two years. According to the FSB, the financial costs suffered by small firms from an attack are “disproportionately bigger” than larger firms.

One of the biggest lessons to take from the year is that no business is immune from cyber threats – and the risk to business survival is higher the smaller the company is.

Senior Security Evangelist, Tony Anscombe of AVG Business said: “Cybersecurity has had a high political and media profile this year, thanks to the US presidential elections. But businesses shouldn’t make the mistake of thinking that the issue is all about nations waging digital warfare or politicians being hacked. The key lessons of the year are about the rise in ransomware, and the new attack vectors that are being created for hackers by the increasing number of connected devices, often with poor built-in security. Business owners need to be thinking harder than ever about internal security, training and procedures, the tools and tech they are bringing in to their organisation, as well as the security they deploy across their network.”

1 in 3 small businesses is clueless about ransomware!

A third of small to medium sized businesses surveyed by AVG had never heard of ransomware, demonstrating an urgent need for education on one of the fastest growing malware categories.


Ransomware is one of the world’s fastest growing malware categories. In June, we surveyed businesses to understand who had heard of the term ‘ransomware’ and what they understood about it. 381 of our small-to-medium business (SMB) customers in the US and UK responded to our questions and the results proved revealing and concerning.

Here are the key points:

68% of respondents said they had heard of the term ‘ransomware.’

/var/www/ content/uploads/2016/09/avgransomware

That may look like a good percentage, but this also indicates that even with security industry, media and governments working hard to educate businesses about the risks, nearly 1 in 3 is still not aware of this significant risk.

So what is ransomware and how does it impact businesses?

Ransomware is a generic term for a category of malware that restricts access to a device or the file(s) on a device until a ransom is paid. It’s a method for criminals to make money by infecting the device and has become very effective at causing havoc for a business or organization that is unfortunate enough to become a victim.

It’s not new, which is why the 32% concerns me. The first cases were reported as far back as 2005, which took the form of fake antivirus software claiming you had issues that required payment in order to be fixed.

Over time, ransomware morphed into scareware messages. Scareware messages, designed to trick users into downloading malicious software and often disguised as communications from law enforcement, typically claim that a device has been infected or that the usage history of a device shows illegal activity—or in some cases blatantly locking files until you call and pay the ransom.

The 68% of respondents claiming to know what ransomware is had very different opinions, many of them inaccurate. When asked to explain the term, it turns out that 36% (of the 68%) didn’t actually know what it was.

A major security concern

Since 2013 when Cryptolocker ransomware first surfaced, ransomware has now become a major security issue with organizations being held to ransom – and in some cases paying to get their data unlocked. Numerous incidents have been cited where thousands of dollars have been paid: hospitals, charities, hairdressers have all been held to ransom. One university has suffered 21 attacks in the last year alone!

The true scale of the problem is somewhat hard to define though because, understandably, many businesses and organisations are reluctant to reveal they’ve been held to ransom because of fears about being targeted again, or losing existing or new customers.

People are held to ransom in just a few seconds

Unsuspecting victims are infected through emails impersonating customer support personnel from well-known company brands. Once activated, the malware encrypts files and demands payment, typically a few hundred dollars within a timeframe of 48 or 72 hours.

Last year alone, the FBI received 2,453 complaints about ransomware hold-ups last year, costing the victims more than $24 million dollars! Earlier this year, the UK National Crime Agency claimed ransomware attacks have increased in frequency and complexity, and now include public threats by the perpetrators to publish victim data online, as well as the permanent encryption of valuable data.

4 ways to protect your computers and networks against ransomware

  1. Stay vigilant. One of the most common methods of infecting a system is via a spearheading email with a malicious attachment or link. If you are not expecting the email, or it looks suspicious in any way, do not open it and delete it.
  1. Back up your software and systems. It’s really important you keep your software and operating system updated. Back-up your files regularly and don’t forget to keep your backup media disconnected from your PC. Otherwise, your backups might get encrypted as well. This also applies to storage and network drives e.g. Google Drive, Dropbox, etc.
  1. Use the latest protection software. At AVG, we take ransomware very seriously and our AVG Internet Security and AntiVirus Business Edition solutions detect and block ransomware and other malware variants from infecting your devices and servers – leaving you to focus on what matters.
  1. Don’t pay. If you do fall victim, do not pay. Funding these criminals only encourages them to attack other people. Research the specific infection to see if there is a decryption tool. We offer 7 of these tools for free with more on the way.

Don’t be the 1 in 3

Taking proactive steps to protect your organization from a ransomware attack is essential to the smooth running of your business—it is your livelihood, after all. Contingency and remediation planning are also crucial to business recovery and continuity, and these plans should be tested regularly.

Scroll Up