{"id":4752,"date":"2015-11-06T17:59:15","date_gmt":"2015-11-06T17:59:15","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4752"},"modified":"2024-09-13T10:15:52","modified_gmt":"2024-09-13T14:15:52","slug":"practical-guide","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/practical-guide\/4752\/","title":{"rendered":"Introducing the Practical Guide on Ransomware"},"content":{"rendered":"<p>As a follow-up to our <a href=\"https:\/\/business.kaspersky.com\/paying-up-or-not\/4733\/\" target=\"_blank\" rel=\"noopener nofollow\">recent foray into ransomware<\/a>, we\u2019re pleased to offer a fundamental practical guide on how to deal with ransomware.<\/p>\n<p>Entitled \u201cCould your business survive a cryptor\u201d, it specifically describes what an encrypting ransomware is, what damage it can inflict, and how to counter this threat, which tends to be quite sophisticated at times.<\/p>\n<p>Cryptors affect both consumers and entire businesses, and in the latter case the ransom demanded tends to be much higher.<\/p>\n<p>The problem is that these bigger payments may only represent a small portion of the overall cost to the business: repercussions of an attack may include lost sales, reduced productivity, significant costs for system recovery, and, overall continuity disruption. A permanent loss of the data \u2013 i.e. when files stay encrypted and no backups are available \u2013 can have much more severe consequences, such as permanent damage to the company\u2019s competitive position, reduction of sales revenues over the long term, and others, including\u00a0going out of business \u2013 simply because of a single act of hi-tech extortion.<\/p>\n<p>The number of cryptor attacks grows quickly: ransomware has proven itself as a good source of illicit gain, so it\u2019s no surprise there are more and more criminals willing to earn money that way.<\/p>\n<p>Ransomware may differ in quality and efficiency, but even the <a href=\"https:\/\/business.kaspersky.com\/paying-up-or-not\/4733\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">FBI recommends<\/a> paying ransom if a company gets hit with top-notch cryptors such as CryptoWall.<\/p>\n<p>According to a survey conducted by the University of Kent\u2019s Interdisciplinary Research Center in Cyber Security, in February 2014, over 40% of CryptoLocker victims agreed to pay the ransom.<\/p>\n<p>And despite the growing threat, just 40% of businesses consider ransomware to be a serious threat. Obviously, this attitude can lead to security weaknesses that can be exploited by cybercriminals, the report says.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a follow-up to our recent foray into ransomware, we&#8217;re pleased to offer a fundamental practical guide on how to deal with ransomware.<\/p>\n","protected":false},"author":209,"featured_media":15544,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2355,420],"class_list":{"0":"post-4752","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-practical-guide","10":"tag-ransomware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/practical-guide\/4752\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/practical-guide\/7964\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/practical-guide\/4752\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/practical-guide\/4752\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/practical-guide\/","name":"practical guide"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4752"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4752\/revisions"}],"predecessor-version":[{"id":52148,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4752\/revisions\/52148"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15544"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}