Ransomware: Why You Should Care

Viruses extortionists (ransomware, cryptoviruses) work in a similar way: they block the user’s desktop, encrypt important documents and files saved on the computer, then delete the originals and demand a ransom. Typically in Bitcoin, so they can provide you with a key to unlock your computer and to be able to continue working and have access to your saved files. Often the creators of cryptoviruses have strict conditions for the terms of payment of the redemption. If the owner of the files does not fit within these terms, the key is deleted and it will be impossible for the user to restore the files.

Ransomware is the most massive and significant attacks of computer viruses in the world.

Here a chronology of the first viruses in history, as well as the largest-scale virus computer attacks.

In 1971, the first program in the world, which was able to independently reproduce copies of itself on a computer network, was created by the engineer of the American technology company BBN Technologies, Bob Thomas. The program, called Creeper was not malicious: its functionality was limited to self-copying and displaying the message: “I’m the creeper, catch me if you can!” A year later another BBN engineer, e-mail inventor Ray Tomlinson, created the first anti-virus that self-replicated on the network computers and deleted Creeper.

The first virus created in 1981 caused an uncontrolled “epidemic.”  This virus spread using a technique now known as a boot sector virus. A virus called Elk Cloner was created by a 15-year-old American high school student Richard Skrenta by infecting the Apple II operating system. The virus infected the magnetic diskettes and, after the 50th access to the infected media a blank screen appears and a joke poem message was displayed. In some cases, the virus could also damage the floppy disk.

The first malicious program Michelangelo that infected over 1 million computers worldwide appeared in 1991 in Australia was written for IBM-compatible personal computers (PCs) and the DOS operating system. Other information from the disk could be restored, but it was difficult for an ordinary PC user to do it. The creator of the virus remained unknown, some cases of program activation were recorded until 1997.

On June 2, 1997, Chen Ing-hau, a student at the University of Datong (Taipei, Taiwan), created the first version of the Chernobyl virus (“Chernobyl” or CIH – according to the first syllables of the author’s name). The virus infected computers with operating systems Windows 95 and 98, triggers on April 26 of each year, the anniversary of the Chernobyl nuclear disaster. The virus erased the boot sector of the hard disk and, sometimes, the BIOS data – the boot sector of the computer. In the latter case, it was required to change the chip on the motherboard or even acquire a new computer, since the old one was out of order.

It is estimated that more than 60 million PCs were infected worldwide, and the damage exceeded $ 1 billion.

On May 5, 2000, the world’s largest epidemic of computer virus began. Created by Filipino students Reonel Ramones and Onel De Guzman, the “worm” ILOVEYOU sent itself to all e-mail contacts of the owner of the infected PC and replaced most of the files with documents, images and music on copies of itself. Only in the first 10 days of the epidemic, the number of infected computers exceeded 50 million. To protect themselves from the epidemic, many government agencies around the world have temporarily disconnected e-mail. The total damage was subsequently estimated at $ 15 billion. The Philippine police quickly found the creators of the virus. However, they went unpunished due to the lack of an article in the local criminal code providing responsibility for computer crimes.

On September 2010, the Stuxnet virus hit the computers of employees of the nuclear power station in Bushehr (Iran). It created problems in the functioning of centrifuges of the Uranium Enrichment Complex in Natanz. According to experts, Stuxnet was the first virus to be used as a cyber weapon.

Danger of Ransomware

On May 12, 2017 a significant number of computers with Windows as operating system were attacked by a virus-extortionist WannaCry. The virus encrypts user files so that they cannot be used. For decrypting the data, the attackers demanded $ 600 in the crypto currency of bitcoin.

According to Europol, the attack affected more than 200,000 computers across 150 countries. The four most affected countries were Russia, Ukraine, India and Taiwan according to Kaspersky Lab.  The attack, in particular, affected the National Health Service hospitals of Great Britain. Up to 70,000 devices including computers, MRI scanners, blood-storage refrigerators, and theater equipment have been affected. Cyber risk modeling firm Cyence estimates the potential costs from the hack at $4 billion.

Don’t Miss: The Dangers of Ransomware & How To Overcome A Cyber Attack

On June 27, 2017, from the attack of a new variant of Petya Ransomware many of large organizations have suffered in multiple countries, but especially in Ukraine and Russia.

The Petya virus spreads through links in e-mail messages and blocks the user’s access to the computer hard drive, demanding a ransom of $ 300 in bitcoins. This is similar to the malicious program WannaCry. During this attack, the radiation monitoring system at Ukraine’s Chernobyl Nuclear Power Plant  went offline. Some Ukrainian ministries, banks and metro systems were also affected. It is said to be the most destructive cyberattack ever.

The Business Continuity Solution to Ransomware

The best solution to protect your data and company from a different type of cyberattack is QBR (Quick Backup Recovery) Business Continuity Service, powered by Datto and provided by Namtek Consulting ServicesQBR entails on-site real-time data and machine backup through virtualization as well as off-site backup to the cloud. This hybrid solution allows for quick recovery during a disaster with no downtime or data loss. For more information about the latest solutions in Backup and Recovery visit us at: Quick-Backup-Recovery.com

dont-be-the-next-victim-of-a-ransomware-attack-qbr

Systems integration: how to avoid mismanagement

As we mentioned in one of our previous articles, change in the workplace is inevitable. The business world is constantly evolving, and companies must always be ready to adapt to change.

This change is happening whether we like it or not, for example, systems integration needs to be well managed in order to constantly improve and take advantage of the surge in technology. As a result, companies with a well-detailed plan that explains the procedures to be followed will gain a competitive edge. That said, unfortunately, poor implementation management is more common than good management, and will often lead to internal resistance.

Business Automation

The major changes we see every day are the implementation of new management software, B2B integration and systems integration.

When business leaders realize that they need to innovate and streamline their business processes, they need to introduce changes to their workplace. Many of them put off this change for as long as possible, until it affects the growth of their business.

Why does this happen so often? Partly because people are creatures of habit. Habit makes our tasks and jobs much easier, and it’s not surprising that people like repetitive actions, stability and security. So it’s not surprising that employees are generally the biggest opponents to business process change. This happens, not because employees don’t want to see their company thrive; but mostly to poor implementation management , the main topic of today’s blog.

Poor management of system implementation and integration

Change is a sensitive subject. As mentioned above, not too many people accept change with open arms. So broaching this subject with employees is a difficult task, and it needs to be presented well.

So why do employees tend to resist software implementation?

  1. Managers don’t communicate with their people properly. If employees don’t know exactly what’s going on (they’re in complete darkness), they’ll resist. Will they lose their jobs as a result? Will their daily tasks be affected? Who will be responsible? How long will it take? When employees have more questions than answers, it becomes a slippery slope.
  2. Employees do not trust the management team, which is not as transparent and open.
  3. The timing of the new software implementation was poorly chosen by management, i.e. during a company’s busy season, causing additional constraints and pressures on the entire team.
  4. Managers, who are responsible for disseminating information, are not competent or expert in this field. Their stress and anxiety about the new project don’t help to calm employees. Fear of the unknown is contagious – managers should be aware of this.

How to implement changes effectively

First of all, managers need to understand that everyone handles change differently, and that resistance is always a possibility. The best way to deal with it is to COMMUNICATE and LISTEN. This strengthens trust between management and employees.

In addition to this, once a Systems Integration has been announced, through a corporate email or meeting, it’s important to address the following points:

  • Why is this integration necessary?
  • Why it’s important for the company (what are its general benefits, short-term benefits and long-term benefits)
  • How will Systems Integration impact the work of individual departments and employees? (What’s in it for them?)
  • What are management’s objectives and expectations for this integration?
  • Who will manage this change? Who can employees contact to discuss change-related issues or share ideas to make change easier for everyone?

By sharing all important information with the whole team, everyone will be on the same page and feel listened to and appreciated.

integrationSoftware implementation in several stages

It is also extremely important to implement any type of software implementation or systems integration in several stages. There are many steps that managers can take before starting a software implementation. Once the news of a software upgrade is announced, it is essential that employees take the time to ask questions, address concerns, read any system documentation, view a system demo (for each department) understand their role during implementation, plan training during implementation, learn about the new process changes that will take place with the new system… After all this, the implementation can take place. Jumping headfirst into an implementation without proper preparation can lead to major resistance and setbacks in the future.

Systems integration – a major advantage for your company

There’s no stopping creation and improvement in the business world. As industries develop, companies must evolve; as technology advances. Companies need to implement changes as quickly as possible; when governments pass new laws, companies need to comply. As customers become more demanding and better informed, companies need to provide better products and fast, efficient service.

It’s time for managers to stop putting off software integration and implementation, and instead focus on helping employees see change in a positive light, which will undoubtedly bring major benefits to your business.


Contact us
today for a smooth and successful software implementation.