[fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_opacity=”0.5″ border_style=”solid” padding_top=”100px”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”0px 0px 0px 0px” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title margin_bottom=”10px” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”Business-Continuity-text” size=”1″ content_align=”center” style_type=”none”]
Ransomware Protection
[/fusion_title][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”2″ content_align=”center” style_type=”none”]
Your secret weapon in the war against cyber extortion.
[/fusion_title][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sep_color=”#7cc40f” width=”70%” alignment=”center” /][/fusion_builder_column][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”70px 0px 0px 0px” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”2″ content_align=”center” style_type=”none”]How it’s impacting businesses like yours[/fusion_title][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sep_color=”#d6d1d1″ bottom_margin=”50px” icon=”fa-angle-down” icon_circle=”yes” icon_circle_color=”#ffffff” width=”70%” alignment=”center” /][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”yes” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_opacity=”0.5″ border_style=”solid” padding_top=”20px” padding_bottom=”20px”][fusion_builder_row][fusion_builder_column type=”1_3″ layout=”1_5″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”1″ border_color=”#c6c6c6″ border_style=”solid” border_position=”all” padding=”20px 20px 20px 20px” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”6271″ style_type=”none” hover_type=”none” align=”center” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/warning.png[/fusion_imageframe][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” bottom_margin=”20px” alignment=”center” /][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”3″ content_align=”center” style_type=”none”]Cybercriminals want your money and will use ransomware to take your business data hostage until you pay.[/fusion_title][/fusion_builder_column][fusion_builder_column type=”1_3″ layout=”1_5″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”1″ border_color=”#c6c6c6″ border_style=”solid” border_position=”all” padding=”20px 20px 20px 20px” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”6277″ style_type=”none” hover_type=”none” align=”center” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/money-bag.png[/fusion_imageframe][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” bottom_margin=”20px” alignment=”center” /][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”3″ content_align=”center” style_type=”none”]The FBI estimates that in 2016, ransomware will cost businesses over $1 billion.[/fusion_title][/fusion_builder_column][fusion_builder_column type=”1_3″ layout=”1_5″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”1″ border_color=”#c6c6c6″ border_style=”solid” border_position=”all” padding=”20px 20px 20px 20px” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”6279″ style_type=”none” hover_type=”none” align=”center” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/target.png[/fusion_imageframe][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” bottom_margin=”30px” alignment=”center” /][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”3″ content_align=”center” style_type=”none”]67% of ransomware targets are SMBs with sub-par IT security and valuable data.[/fusion_title][/fusion_builder_column][fusion_builder_column type=”1_2″ layout=”1_5″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”1″ border_color=”#c6c6c6″ border_style=”solid” border_position=”all” padding=”20px 20px 20px 20px” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”6289″ style_type=”none” hover_type=”none” align=”center” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/time.png[/fusion_imageframe][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” bottom_margin=”20px” alignment=”center” /][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”3″ content_align=”center” style_type=”none”]96% of ransomware victims lose access to their data for more than a day, causing business-thwarting downtime.[/fusion_title][/fusion_builder_column][fusion_builder_column type=”1_2″ layout=”1_5″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”1″ border_color=”#c6c6c6″ border_style=”solid” border_position=”all” padding=”20px 20px 20px 20px” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”6291″ style_type=”none” hover_type=”none” align=”center” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/three-routers.png[/fusion_imageframe][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” bottom_margin=”20px” alignment=”center” /][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”3″ content_align=”center” style_type=”none”]The only effective strategy is a multi-layered defense. Datto’s Total Data Protection Platform is guaranteed to protect you from ransomware.[/fusion_title][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_color=”#f1f1f1″ background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_opacity=”0.5″ border_style=”solid” padding_top=”50px” padding_bottom=”50px”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”2″ content_align=”center” style_type=”none”]What is Ransomware?[/fusion_title][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sep_color=”#d6d1d1″ bottom_margin=”50px” icon=”fa-angle-down” icon_circle=”yes” icon_circle_color=”#ffffff” width=”70%” alignment=”center” /][/fusion_builder_column][fusion_builder_column type=”1_2″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]
Malicious software that locks your files and demands payment to access them.
Ransomware is a term for the many variations of malware that infect computer systems, typically by social engineering schemes.
A cryptovirology attack encrypts critical files and systems and renders them inaccessible to the owner.
Ransomware sometimes marks the files for permanent deletion or publication on the internet. The perpetrators then demand a payment (usually in untraceable cryptocurrency like Bitcoin) for the private key required to decrypt and access the files. Infamous ransomware examples include CryptoLocker, CryptoWall, Locky, Cerber, KeyRanger, SamSam, TeslaCrypt, TorrentLocker, and Reveton.
[/fusion_text][/fusion_builder_column][fusion_builder_column type=”1_2″ layout=”1_2″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”6369″ style_type=”none” hover_type=”none” align=”right” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/ransomware.png[/fusion_imageframe][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_opacity=”0.5″ border_style=”solid” padding_top=”50px” padding_bottom=”50px”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”2″ content_align=”center” style_type=”none”]Who are Ransomware Perpetrators?[/fusion_title][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sep_color=”#d6d1d1″ bottom_margin=”50px” icon=”fa-angle-down” icon_circle=”yes” icon_circle_color=”#ffffff” width=”70%” alignment=”center” /][/fusion_builder_column][fusion_builder_column type=”1_2″ layout=”1_2″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”6378″ style_type=”none” hover_type=”none” align=”left” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/hacker.png[/fusion_imageframe][/fusion_builder_column][fusion_builder_column type=”1_2″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]
Cybercriminals who profit greatly by violating businesses that rely on data as a lifeblood.
Ransomware cybercriminals are organized and profitable. It is estimated that this type of attack earns criminals $10 million to $50 million per month.
There are entire ransomware outfits working out of office buildings, making the stealthy and disruptive pieces of malicious software, and designing deceptively simple schemes to infiltrate small to medium sized businesses.
The criminals are business-minded innovators. Recently, a Ransomware-as-a-Service organized cybercrime ring was discovered, which infected around 150,000 victims in 201 countries in July 2016; splitting profits 40% to malware authors and 60% to those who discover new targets.
The overhead is low, the profits are high, the Bitcoin is anonymous, the list of targets is endless, the technology is not overly complicated, and the odds of getting caught are low. Ransomware perpetrators are sophisticated, profit-hungry, cybercriminals on the lookout for unsuspecting SMBs to violate.
[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_color=”#f1f1f1″ background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_opacity=”0.5″ border_style=”solid” padding_top=”50px” padding_bottom=”50px”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”2″ content_align=”center” style_type=”none”]Could my business be a Ransomware victim?[/fusion_title][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sep_color=”#d6d1d1″ bottom_margin=”50px” icon=”fa-angle-down” icon_circle=”yes” icon_circle_color=”#ffffff” width=”70%” alignment=”center” /][/fusion_builder_column][fusion_builder_column type=”1_2″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]
In a word: Yes.
Ransomware perpetrators cast a wide net. They target small to medium sized businesses with IT security loopholes, valuable data, and a modest budget to pay the ransom.
If data is important to your business, you are a target.
To get in to your systems, they may send a phishing email to your staff. Because 94% of people can’t distinguish between a real email and a phishing email 100% of the time, they get in. And if they don’t, they try again until someone somewhere clicks the link.
[/fusion_text][/fusion_builder_column][fusion_builder_column type=”1_2″ layout=”1_2″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”6375″ style_type=”none” hover_type=”none” align=”right” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/virus-2.png[/fusion_imageframe][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_color=”#7cc40f” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_opacity=”0.5″ border_style=”solid” margin_bottom=”0px” padding_top=”20px” padding_bottom=”20px”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title margin_bottom=”10px” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”2″ content_align=”center” style_type=”none”]
Read the Spiceworks APAC MSP Ransomware Research Report
[/fusion_title][fusion_button link=”https://addictive.net.au/wp-content/uploads/2017/09/Datto-APAC-MSP-Ransomware-Report.pdf” target=”_blank” alignment=”center” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” color=”custom” button_gradient_top_color=”#ffffff” button_gradient_bottom_color=”rgba(255,255,255,0.75)” button_gradient_top_color_hover=”#ffffff” button_gradient_bottom_color_hover=”#ffffff” accent_color=”#7cc40f” accent_hover_color=”#7cc40f” stretch=”default” icon_position=”left” icon_divider=”no” animation_direction=”left” animation_speed=”0.3″]Download now[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_opacity=”0.5″ border_style=”solid” padding_top=”50px” padding_bottom=”20px”][fusion_builder_row][fusion_builder_column type=”1_4″ layout=”1_4″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”1″ border_color=”#e2e2e2″ border_style=”solid” border_position=”right” padding=”0px 30px 0px 0px” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”3″ content_align=”left” style_type=”none”]
$209 Million
[/fusion_title][fusion_text]”Cyber-criminals collected $209 million in the first three months of 2016 by extorting businesses”[/fusion_text][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” bottom_margin=”20px” alignment=”center” /][fusion_imageframe image_id=”6310″ style_type=”none” hover_type=”none” align=”none” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/Cnn-3.png[/fusion_imageframe][/fusion_builder_column][fusion_builder_column type=”1_4″ layout=”1_4″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”1″ border_color=”#e2e2e2″ border_style=”solid” border_position=”right” padding=”0px 30px 0px 0px” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”3″ content_align=”left” style_type=”none”]2,315,931[/fusion_title][fusion_text]”2,315,931 global users encountered ransomware between April 2015 and March 2016″[/fusion_text][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” bottom_margin=”20px” alignment=”center” /][fusion_imageframe image_id=”6315″ style_type=”none” hover_type=”none” align=”none” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/Kaspersky_Lab_logo.png[/fusion_imageframe][/fusion_builder_column][fusion_builder_column type=”1_4″ layout=”1_4″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”1″ border_color=”#e2e2e2″ border_style=”solid” border_position=”right” padding=”0px 30px 0px 0px” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” bottom_margin=”30px” alignment=”center” /][fusion_text]”Cyber-criminals collected $209 million in the first three months of 2016 by extorting businesses”[/fusion_text][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” bottom_margin=”40px” alignment=”center” /][fusion_imageframe image_id=”6317″ style_type=”none” hover_type=”none” align=”none” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/IBM.png[/fusion_imageframe][/fusion_builder_column][fusion_builder_column type=”1_4″ layout=”1_4″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”1″ border_color=”#e2e2e2″ border_style=”solid” border_position=”right” padding=”0px 30px 0px 0px” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” bottom_margin=”20px” alignment=”center” /][fusion_text]”Ransomware… even with small infection numbers, the impact of just one infection can be hugely detrimental – especially if that infection happens on a corporate server or backup device”[/fusion_text][fusion_imageframe image_id=”6320″ style_type=”none” hover_type=”none” align=”none” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/microsoft.png[/fusion_imageframe][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_opacity=”0.5″ border_style=”solid” padding_top=”50px” padding_bottom=”20px”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title margin_bottom=”10px” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”2″ content_align=”center” style_type=”none”]3 Layers of Protection from Ransomware[/fusion_title][fusion_text]
The proven defense strategy against cyber extortion includes three protection layers: Education, Antivirus, and Total Data Protection.
[/fusion_text][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sep_color=”#d6d1d1″ bottom_margin=”50px” icon=”fa-angle-down” icon_circle=”yes” icon_circle_color=”#ffffff” width=”70%” alignment=”center” /][fusion_imageframe image_id=”6324″ style_type=”none” hover_type=”none” align=”center” lightbox=”no” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” animation_direction=”left” animation_speed=”0.3″]https://addictive.net.au/wp-content/uploads/2017/09/3-Layers-of-Protection.jpg[/fusion_imageframe][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_opacity=”0.5″ border_style=”solid” padding_top=”20px” padding_bottom=”20px”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_2″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_content_boxes layout=”icon-on-top” columns=”3″ icon_align=”left” animation_direction=”left” animation_speed=”0.3″ hide_on_mobile=”small-visibility,medium-visibility,large-visibility”][fusion_content_box title=”Education” iconspin=”no” image=”https://addictive.net.au/wp-content/uploads/2017/09/education-1.png” image_width=”100″ image_height=”100″ linktext=”Read More” animation_direction=”left” animation_speed=”0.3″]
Educate anyone with access to company email, computers, and servers with a user awareness training program aimed to inform about the dangers of social engineering schemes and phishing scams. Teach good security practices about email attachments and stress the importance of diligence. However, even the most educated and well-meaning staff members are not immune to human error. Education, on its own, is not adequate protection.
[/fusion_content_box][fusion_content_box title=”Antivirus” iconspin=”no” image=”https://addictive.net.au/wp-content/uploads/2017/09/antivirus.png” image_width=”100″ image_height=”100″ linktext=”Read More” animation_direction=”left” animation_speed=”0.3″]
Antivirus software is the second layer of a sound defense. Quality antivirus protection can stop thousands of attack attempts per day. In the case that an employee does click a malicious link or downloads a Trojan-containing attachment, antivirus will often save a system from full-blown infection. However, new strains of ransomware are always being created, often at a rate higher than antivirus can protect against them, so eventually, the probability that one infection will succeed is high.
[/fusion_content_box][fusion_content_box title=”Total Data Protection” iconspin=”no” image=”https://addictive.net.au/wp-content/uploads/2017/09/protection-1.png” image_width=”100″ image_height=”100″ linktext=”Read More” animation_direction=”left” animation_speed=”0.3″]
A data protection solution provides the ultimate failsafe in a layered defense strategy against ransomware. A data protection solution will automatically and invisibly take snapshots of your data and systems at regular intervals, and store that data in a secure location. Should ransomware successfully penetrate your layered defenses, you can simply ‘turn back the clock’ to a snapshot of your business before the attack happened. No ransom, no downtime, no problem.
[/fusion_content_box][/fusion_content_boxes][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_opacity=”0.5″ border_style=”solid” padding_top=”20px” padding_bottom=”20px”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”2″ content_align=”center” style_type=”none”]Get Protected with Datto[/fusion_title][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sep_color=”#d6d1d1″ bottom_margin=”50px” icon=”fa-angle-down” icon_circle=”yes” icon_circle_color=”#ffffff” width=”70%” alignment=”center” /][/fusion_builder_column][fusion_builder_column type=”1_3″ layout=”1_3″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”3″ content_align=”center” style_type=”none”]Datto SIRIS[/fusion_title][fusion_text]No matter what or where the cybercriminals target, SIRIS will protect physical, virtual, and cloud infrastructures and data. The business continuity offered by Siris will protect you from ransomware.[/fusion_text][fusion_button link=”#” target=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” color=”custom” button_gradient_top_color=”#000000″ button_gradient_bottom_color=”#000000″ button_gradient_top_color_hover=”#7fc514″ button_gradient_bottom_color_hover=”#7fc514″ accent_hover_color=”#ffffff” border_width=”1″ stretch=”default” icon_position=”left” icon_divider=”no” animation_direction=”left” animation_speed=”0.3″]Explore Datto SIRIS[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ layout=”1_3″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”3″ content_align=”center” style_type=”none”]Datto Backupify[/fusion_title][fusion_text]Even if ransomware damages your data on cloud-based applications like Office 365, Google Apps, or SalesForce, using Backupify protects the data that is the lifeblood of your business.[/fusion_text][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” top_margin=”10px” bottom_margin=”10px” alignment=”center” /][fusion_button target=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” color=”custom” button_gradient_top_color=”#000000″ button_gradient_bottom_color=”#000000″ button_gradient_top_color_hover=”#7fc514″ button_gradient_bottom_color_hover=”#7fc514″ accent_hover_color=”#ffffff” border_width=”1″ stretch=”default” icon_position=”left” icon_divider=”no” animation_direction=”left” animation_speed=”0.3″]Explore Datto Backupify[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ layout=”1_3″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”3″ content_align=”center” style_type=”none”]Datto Drive[/fusion_title][fusion_text]Ransomware attacks are commonly spread through traditional file syncing, when one user’s infection can spread to others; By using Datto Drive, you can easily roll back to a backup created before the attack.[/fusion_text][fusion_button target=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” color=”custom” button_gradient_top_color=”#000000″ button_gradient_bottom_color=”#000000″ button_gradient_top_color_hover=”#7fc514″ button_gradient_bottom_color_hover=”#7fc514″ accent_hover_color=”#ffffff” border_width=”1″ stretch=”default” icon_position=”left” icon_divider=”no” animation_direction=”left” animation_speed=”0.3″]Explore Datto Drive[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_color=”#7cc40f” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_opacity=”0.5″ border_style=”solid” margin_bottom=”0px” padding_top=”20px” padding_bottom=”20px”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title margin_bottom=”10px” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”2″ content_align=”center” style_type=”none”]
Ready to grow your business?
[/fusion_title][fusion_title hide_on_mobile=”small-visibility,medium-visibility,large-visibility” size=”2″ content_align=”center” style_type=”none”]
We’d love to help.
[/fusion_title][fusion_button link=”https://addictive.net.au/contact-us/” target=”_blank” alignment=”center” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” color=”custom” button_gradient_top_color=”#ffffff” button_gradient_bottom_color=”rgba(255,255,255,0.75)” button_gradient_top_color_hover=”#ffffff” button_gradient_bottom_color_hover=”#ffffff” accent_color=”#7cc40f” accent_hover_color=”#7cc40f” stretch=”default” icon_position=”left” icon_divider=”no” animation_direction=”left” animation_speed=”0.3″]Request a demo[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]