× Home Why Elliptic Testimonies Partners and Certifications Products Allworx Phone Systems Datto Dell Corporation Dell Hardware Solutions Dell PC Advisor Lenovo Lenovo Hardware Solutions Hewlett Packard Cisco VMware Solutions for your Business Free Stuff Free Data Assessment Free Network Assessment Support Center About Us Contact Us Careers Referrals Testimonies
☰ Navigate

Datto

Datto Partner Logo

Ransomware and You

Are you here because you are a victim of Ransomware? Or are you interested in being pro-active to protect your data from Ransomware?

We don't mean to scare you, but there is a monstrous threat devouring data across the nation!

Ransomeware Monster

Image provided by Datto

Ransomware Protection and Recovery Solution

Your data is more valuable to you than to anyone else. That is why hackers are after your data: so they can sell it back to you. They want to prevent you from doing business, in effect holding your business for ransom. All it takes is one click by one employee on an attachment in an email personalized for them, designed to look genuine. That one click begins the process of locking down the employee's files. In short order, they are prevented from doing their job. Then it silently spreads to other desktops and servers on the network. If left unchecked, it will shut down your business in hours. Your valuable data will be encrypted and marked for deletion unless the ransom is paid. Most attacks also include a countdown timer, with portions of your business data deleted permanently as the clock ticks down and no ransom is paid.

If this has happened to you, you are not alone. Ransomware attacks are succeeding on an unprecedented scale. With individual attacks netting anywhere from a few hundred to thousands of dollars, Ransomware netted over $325 million in 2015, and has already made over $200 million in the first half of 2016. In this environment, what can you do about it?

Prevention through Business Continuity

Datto is pleased to announce the industry's first Ransomware Protection and Recovery Solution (RPRS). Built on top of innovative new features in the Datto SIRIS, NAS, Backupify and Datto Drive product lines, this solution will detect a ransomware attack, and roll back systems to a point in time before the attack happened. This includes protecting files and folders anywhere on the network, on mobile devices, workstations, and in the cloud.

So please feel free to contact us here at Elliptic Systems so we can begin to help you develop a disaster backup and recovery solution that fits your business needs.

The Ransomware Family

There are a few dominant types, or families, of ransomware in existence. Each type has its own variants. It is expected that new families will continue to surface as time goes on. Historically, Microsoft Office, Adobe PDF and image files have been targeted, but McAfee predicts that additional types of files will become targets as ransomware continues to evolve.

Ransomware Family Provided by DATTO

Image provided by Datto

These nasty creatures make up the ransomware family. Ransomeware, the cash cow of today's hackers, has become an incredibly lucrative resource, netting cyber thieves millions of dollars a year. From CryptoLocker and Locky to CrptoWall and TeslaCrypt, it's all bad news for vulnerable end users and businesses. Get the facts straight and protect your data before it's too late.

CTB-Locker

The criminals behind CTB-Locker take a different approach to virus distribution. Taking a page from the playbooks of Girl Scout Cookies and Mary Kay Cosmetics, these hackers outsource the infection process to partners in exchange for a cut of the profits. This is a proven strategy for achieving large volumes of malware infections at a faster rate.

CryptoLocker

Ransomware has been around in some form or another for the past two decades, but it really came to prominence in 2013 with CryptoLocker. The original CryptoLocker botnet was shut down in May 2014, but not before the hackers behind it extorted nearly $3 million from victims. Since then, the CryptoLocker approach has been widely copied, although the variants in operation today are not directly linked to the original. The word CryptoLocker, much like Xerox and Kleenex in their respective worlds, has become almost synonymous with ransomware.

TorrentLocker

TorrentLocker is typically distributed through spam email campaigns and is geographically targeted, with email messages delivered to specific regions. TorrentLocker uses an AES algorithm to encrypt file typ