RansomwareWe’ve talked a lot about ransomware in the last year. Frankly, the whole world has been talking about it as it becomes one of the leading global cybersecurity threats. The biggest problem with this type of malware is the urgency it creates. Because of an impending threat of data loss and being locked out of your own machine, you feel the need to act immediately. So the question becomes should you pay the ransom? The answer is tricky.

Almost all sources would suggest that if you have access to an expert that can help you circumvent the ransomware code, then by all means, that is what you should try. There are risks of losing your data, but your expert should be able to determine fairly quickly if they can work around it. If they can’t, then you’re faced with the pay or not decision.

When these attacks first started occurring in 2015, the advice from many sources, like this 2015 blog post, would suggest you evaluate how important that data is to you. “If the crooks have implemented the encryption process properly, the only way to get your files back is to to pay them for a copy of the decryption key.” Is it worth risking complete loss for a couple hundred dollars? In that moment of panic, that may seem like a simple decision depending on the information you’ve lost control of. And, more often than not, payment would solve the problem. “For better or for worse, most ransomware gangs have acquired a bit of an ‘honour among thieves’ reputation, so that if you do pay over the money, you almost certainly will get your files back.” (NakedSecurity)

Some people spoke out against paying the ransom. “Paying ransom makes the situation worse because it rewards criminal behavior. The groups behind ransomware know victims will pay, which has resulted in more ransomware variants and new attack vectors. It’s basic game theory: One victim pays the ransom, so the game will be repeated for the next victim, who will look at what the first victim did.” (Infoworld)

Now, the voices are overwhelmingly leaning towards not paying. “As the attacks… around the world continue, with the latest number of compromised databases ranging between 29,000 to more than 32,000 depending on whom you ask, virtually none of the victims who have paid the ransom have gotten their data back.”

“In fact, many ransom payments are going to criminals who didn’t compromise the database in the first place. One attacker steals the data, wipes the database, and leaves behind the ransom note. Another attacker comes along and overwrites the ransom note with their own, and other attackers keep piggybacking on top of each other. At this point, there’s no reason to pay because victims don’t know who actually has their database.” (Infoworld)

So, what should you do? The first step is to do everything in your power to prevent ransomware from getting into your system in the first place.

    • Invest in best-in-class cybersecurity, including antivirus software that actively monitors and prevents malware attacks. Keep it up to date!
    • Create secure backups of your data on a regular basis. Whether this means flash drives, an external hard drive, or automatic cloud back up.
    • Keep informed and alert. Read up on new malware attacks. Don’t click on or open sites, emails, or messages that seem fishy… or “phishy.”

If you think your data security is at risk and you don’t know how to protect it, call the experts at Great Lakes Computer. We have many services, including cybersecurity programs, to help you keep your data protected. Read the case study below to learn how we have helped clients in ransomware situations get their data back. And in the event of a breach, we have digital forensic specialists to help find the source of the breach and make sure it doesn’t happen again. Let us worry about your cybersecurity so you don’t have to.

data backup

Nothing is More Important Than Data Backup

The underlying backbone of all digital and IT security for any individual, organization or business is data backup. The reason why boils down to this: ...
Phishing Emails Would You Take the Bait

Phishing Emails: Would You Take the Bait? 

Spam email attacks (otherwise known as phishing) are one of the largest threats facing all businesses today. They are everywhere and affect everyone. ...
4 Key IT Vulnerabilities and How to Prevent Them

4 Key IT Vulnerabilities and How to Prevent Them 

We currently face a growing IT security threat landscape. Therefore, organizations of all sizes need increasingly professional and threat-specific sol ...