Advantages And Disadvantages Of Ransomware

Decent Essays
Advancements in technology have really been a service for people nowadays. Many people really need technology in order to do everyday tasks, such as checking their email and other things. Hospitals and banks may keep their records on an interface in order to make sure that it is protected. But as technology advances, so do the ways to infiltrate said technology. Hackers are able to get into people’s computers and steal information. Sometimes, people can get money for stealing said information. One of the ways this can be done is in the form of ransomware. Ransomware is a type of malware that prevents the user from accessing files in his/her system. In order to unlock the system, the victim will have to either expel the hacker from the system, …show more content…
As mentioned previously, ransomware can happen to anyone, and people need to be prepared to fight against it if the threat seems to be looming over their heads. The best way for someone to protect his/her computer from ransomware is to backup his/her files onto a separate hard drive. If the victim of ransomware has a separate back up, then he/she can take the risk of losing the files on the computer, because he/she already has them somewhere else. The only issue remaining in this case is to get rid of the hacker, as the hacker still has the important information under lock. It is difficult to restore the computer after it has been a victim of ransomware, so if there is a separate hard drive with the important information backed up on it, then the computer may not need to be recovered. Although it seems tedious, making a backup drive will prevent people from losing important files, and everyone is capable of having a backup drive. It can even be as simple as putting the information on a flash drive and keeping said drive somewhere …show more content…
The other main targets of ransomware are large companies and organizations. Companies and organizations need to be weary of this type of hacking, as not only would they be losing a lot of information, but also lose a lot of money as well. Many businesses, especially now, need to use technology to keep track of day-to-day operations and to keep important files on hand. Without the use of this technology, the employees may be lost as what to do around the company and all of the information around the business will be compromised. Information about new products or new methods of getting money could be spread unless the company pays the ransom to the hackers. Also, because the servers connect throughout the entire company, all of the company’s servers could be locked, and it is possible that no employee could gain access to it unless the ransom is paid. Companies need to have good security to make sure that their information doesn’t get compromised or deleted, and they need to make sure that the company won’t get attacked with the ransomware at some point in the future. Also, company managers need to know how to deal with the threat of ransomware if this was to happen to his/her

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Many of these concerns may be remedied by simply revisiting the company policies and procedures. Data loss is a serious problem. Typically large companies have an automatic data backup in place. Proper automatic backups can be set up daily, weekly, or monthly. For this size company, I would recommend daily backups.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable.…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The hacker can also gain access to the files saved on the hard drive and share them with others in…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The things that can get stolen can include computers, monitors, keyboards, printers and other general equipment. This will cost the company money to replace all of this equipment. Not only will it cost the company money for the equipment but it can also impact on how much work the employees can get done without certain amounts of equipment. This can seriously affect performance at the company.…

    • 1227 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    2) Do not use cloud based applications to store company information. These services may transfer data to not secure parties. 3) Do not share your data (do not synchronize) with other devices at home or any other places; not even with family and friends. By doing this you are inviting others to your share your network and facilitating the way for intrusions. 4) Throughout work hours, employees must keep to the minimum the usage of private devices for personal motives.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    “A recent Government Accountability Office (GAO) report found the number of information-security incidents in which personal information was involved has more than doubled over the last few years, exceeding 25,000 in fiscal 2013” (“Privacy”). That means that every day there are approximately 68.5 incidents where personal information is stolen from major holders of sensitive data, such as credit card information, social security numbers, and usernames and passwords. So through the use of a virus, bug (a flaw in the software being used), and malware, thieves are able to gain access to…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Another big concern is the potential loss of data. You may have all the files and software backed up but that isn’t enough to get rid of the fact that they could completely disappear. Technology is always crashing, and that crash could wipe out everything. It can wipe out everything from the computer such as patient files who have more than 20 years of their medical information in. There are always glitches in technology, and there should always be a hard copy of the files placed in a…

    • 608 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    College Security Risks

    • 1018 Words
    • 5 Pages

    As a security analyst in the Information technology environment at the Aim Higher College, I have seen many attacks from the hackers that attempt to steal the sensitive data of the college and expose it to the whole world or alter it in some way. I have seen the many threats that have existed on the college’s data and systems at one point. Furthermore, I discovered many vulnerabilities in college’s systems, I captured them before the intruders can get their hands on them and make an effort to exploit the vulnerabilities. Moreover, I gave many suggestions on how to fix and secure on many issues that were affecting the college’s network and systems.…

    • 1018 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Introduction Over the last few decades, American Society has rapidly changed due to the prompt development of advanced computer technology. These advancements continue to energize the next generation to push the boundaries of the possible, by challenging the impossible. Throughout the previous decades these boundaries have continued to be extended and defeated, impelling professionals to reanalyze what is truly impossible. However, due to the incredible pace in which these advancements are being achieved, international communities, like America, are left defending against threats and vulnerabilities that are unknown.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ten Online Security Mistakes Seniors Make Seniors, in general, are trusting souls and don’t understand the dangers online. There are so many cyber thieves online searching and lurking, waiting for their next trusting victim to make a mistake. Each day at least 1 million cyber-attacks are executed, and the number is growing. It’s our job to keep our seniors informed and protected from all dangers, including the internet. Here are 10 tips on how to explain to seniors they are vulnerable to cyber thieves.…

    • 929 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In recent years, Cyber-attacks have become a more common form of terrorism used against the United States. Cyber-terrorist have the ability to access bank accounts, shut down systems, and send malicious viruses to ordinary citizens from the comfort of their home. It may be possible for terrorist to hack into States and Federal systems, which would be catastrophic on a global level; cyber-attacks are happening more and more often than they should. This type of cybercriminals has cost the US 580,000 jobs and $100 billion, with the global cost as much as $400 billion (2013). The legal field have been targeted by cybercriminals, the sensitive data about their clients have created a gold mine for the cybercriminals, and in an effort…

    • 1394 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    - Employees need to store sensitive information, including protected health information (PHI) on protected network servers only. - Employees need to avoid accidental spills by keeping food and drink away from workstations. - Laptops that contain sensitive information need to be secured by using cable locks or by locking them in drawers or cabinets. - Employees need to comply with the Portable Workstation Encryption…

    • 636 Words
    • 3 Pages
    Improved Essays