A new cyberattack is spreading in Europe, Russia and the U.S. affecting major banks, metro systems, and large corporations around the world. Similar to the recent WannaCry attack, it is a ransomware virus that can be launched with the click of a button, and it’s called “PETYA.”

Unlike WannaCry, the Petya virus doesn’t just encrypt individual files. It encrypts entire hard drives.

It can infect patched and unpatched systems and spreads quickly through networks. Those hit with Petya will see a locked screen demanding money to get the files back. 

THE BEST PRACTICE IS NEVER TO PAY THE RANSOM – If you become a victim of any ransomware attack, you should be ready to restore from a reliable and tested backup system.

Most businesses don’t have the resources or skill set to properly prepare for today’s threats.

Businesses today need the ability to protect against or prevent attacks, detect when an attack is happening, and the ability to respond to the attack. This requires a layered approach and a level of understanding that few people have.

Sadly, most of us are vulnerable to clicking the wrong thing at the wrong time. Crafty hackers prey on basic human behavior to spread cyber infections and gain access to your critical systems and data.

What can be done? Partner with an IT company like Restech to have a cybersecurity plan to manage vulnerability and reduce the risk of attacks and data loss. Restech applies an array of technologies and training to greatly reduce the likelihood of a successful attack against your company and personal information.

The layers of protection you should have:

· Web traffic filtering

· Web Reputation Filtering

· Spam and email threat protection

· Local AntiVirus and AntiMalware protection

· Properly configured and tested data recovery systems

· System Updates services

· Regular Vulnerability testing

· Ongoing User Awareness training

· Remote access protection

· Properly configured WIFI access

· Training of the executives and owners about their particular vulnerabilities

With the increasing number of global cyberattacks, businesses can no longer afford to ignore a proper investment into cybersecurity. Sign up with the link below to understand how vulnerable your network is to cyber threats.

{{cta(‘318bbe93-9321-4f6e-aa63-2520fc405a4b’)}}