Panda Security Launches its Practical Security Guide for Avoiding Cyberextortion in Businesses

Panda Security Launches its Practical Security Guide for Avoiding Cyberextortion in Businesses

Ransomware is one of the most common cyberextortion threats among cybercriminals; Companies are the main target; In 2016 it is believed that we will see the highest ever levels of cyberattacks.

Security in large companies is one of the most important factors in avoiding extortion on the corporate network by cybercriminals.

This is why Panda Security has launched its Practical Security Guide for avoiding cyberextortion, in which it states that Spanish companies are the ones that suffer the highest rate of data theft in Europe. The guide also states that in the coming year, Spain will become the European country with the highest rate of cyberattacks.

Practical Security Guide for avoiding cyberextortion:
http://www.pandasecurity.com/mediacenter/src/uploads/2016/02/Cyberextortion_Guide.pdf

Cyberextortion: a limitless threat
In recent years, the massive growth in cyberattacks has led to companies devoting more time and resources to combating the problem, and finding a security solution that guarantees greater control of their files.

The majority of attacks that use this type of extortion have different origins: 39% come from insecure or fraudulent websites, 23% from programs downloaded from the Internet, and 19% come from infected emails or attached documents.

The cyberextortion process starts by blackmailing victims into paying to avoid the kidnapping of their files. Once the user agrees, the payment is completed with Bitcoins. Later, the victim receives an email with the code to decrypt the data, although many times payment doesn’t guarantee that the company won’t become a victim again in the future.

Type of malware: How do they affect the companies?
Businesses are considered the main target of this type of malware, as its aim is to cause as much damage as possible:

- Ramsonware, the most common are Cryptolocker, Cryptowall, and CoinVault, which target the integrity of the file stored on the PC

- APT (Advanced Persistent Threat), is a system that manages and controls the security of the computer from inside

- Exploit, takes advantage of a security flaw in communication protocols between computers

- Phishing, creates a false URL to steal bank details and identity

- Trojan, installs different applications that allow hackers to control the computer

- Worm, is able to infect all computers

Panda Security’s 5 tips for avoiding cyberextortion
1. Advise your users: keep them up to date with the risks that are associated with not having a good security solution
2. Set out rules for online use at work: assign a series of rules that control the reputation of websites that access is granted to.
3. Design a solution to your needs: make sure you have the right solution for your business, and keep it updated.
4. Establish protocols: control installation and running of software. Also, examine what applications have been installed periodically.
5. Always update: set out an update policy and block certain applications on your computers.

About Panda Security

Founded in 1990, Panda Security is the world's leading cloud-based security solutions company. Based in Spain, the company has a direct presence in over 80 countries, products translated into more than 23 languages and millions of users worldwide. Its mission is to simplify the complexity by creating new and better solutions to safeguard the digital life of its users.

Panda Security: http://www.pandasecurity.com/


Related News

A Simple Security Guide for Avoiding Online Attacks

Today, the most appreciated themes on Bitcoin forums are the security related ones. Many people write their thoughts about how to protect private data from government, hackers and, sometimes business competitors. Let’s discover what can you do to prevent different bad people from stealing your personal data or bitcoins. It isn’t so dangerous to visit the....

The Panda DeFi Pre-Sale Launches March 25, Bamboo Tokens Await Early Birds

Decentralized Finance is about to undergo a major shift in the blockchain industry.  By enabling cross-chain exploration, the Panda DeFi Blockchain aims to simplify the creative economy through high performance and zero fees. It incorporates new DeFi protocols, NFT projects, and decentralized apps (dApps). Capable of high transaction throughput, Panda DeFi offers unmatched features like […]

Interview with Crowdcurity: Crowd Sourced Web Security

There currently exists a crowdsourced web security platform called Crowdcurity that allows businesses to pay for security services in bitcoin and links these businesses with security researchers from all around the planet. While attending the Cryptolina Bitcoin conference last month in North Carolina, I had the chance to meet Jacob Hansen, one of the guys behind it, and ask him a few questions. Interview with CrowdCurity. What is CrowdCurity and how was it formed? CrowdCurity is a crowdsourced web security platform. We connect +1500 security researchers with businesses all around the....

Panda DAO says it will dissolve and return investor's assets due to internal ...

"Too much time in governance, too little time in development, too many voices in price. Too tired and refund it all," a core team member wrote. On Monday, decentralized autonomous organization Panda DAO put forth a new proposal to dissolve itself and return assets back to investors. According to the seven-point referendum, between 500 million and 700 million PANDA tokens out of the 1.292 billion PANDA in circulation would be distributed among investors. Of those remaining, some would be redistributed among liquidity providers. Meanwhile, an estimated 50 million PANDA will be burned, and....

The Ill Wind of Bitcoin Exchange Hackings - Once Bitten, Twice Shy (Part2)

The blockchain technology is now sitting at a stage of evolution that is somehow similar to the that of the internet in the 1990s. No one can overlook the millions of dollars invested, the hefty merchant adoption and the large number of businesses inspired by bitcoin and the blockchain technology. Nevertheless, the lack of standardized security models has rendered most of today's bitcoin exchanges & businesses vulnerable to hack attacks, especially when basic security measures are overlooked. The aftermath of this immature and inconsistent handling of security issues has unfolded many....