You want friendly software?

15 October 2020
3 Minutes of reading

Ransomware: The enemy who steals your house keys

Ransomware: The enemy who steals your house keys

We're used to dealing with all sorts of cyber attacks that we hardly notice. Hackers are looking for every possible and imaginable way to break through the natural wall of mistrust that preserves people from providing sensitive data to strangers and even more intense is the commitment they put in place to circumvent the barriers - this time artificial - behind which companies protect themselves to avoid seeing their work fade by months if not years.

The new frontier of cyber attacks has a new protagonist, which is called ransomware. According to "The state of ransomware 2020", a survey conducted by Sophos, 41% of Italian companies have suffered at least one such attack in the last year alone.

Ransomware: What is it and how does it strike?

To simplify the concept as much as possible, we could say that this new actor on the cybercrime scene is nothing more than a malware that has the task of blocking access to the device it infects, requesting a ransom for its "liberation" or to provide the key through which to decrypt the files, otherwise no longer usable.

According to Sophos, the average cost of overcoming such an attack is around $1.4 million if the ransom is paid, while it drops to about half if the company chooses to ignore the blackmail and start from scratch.

Many companies, just to avoid running into problems of this type, have activated an effective backup system that has allowed them to recover lost data with great simplicity: we are talking about 79% of the sample analyzed. Only 6% was forced to resort to the payment of the ransom.

Curing damage or preventing it with an effective cybersecurity system?

The other interesting fact of the paper is less comforting than the above. We are all accustomed, especially if it has happened to us or someone close to us, to prevent the recurrence or occurrence of mishaps or inconveniences that could put our physical or economic health at risk. Let's go to the dentist before the tooth decay becomes impossible to treat, if we know that in that period we may not have insurance for the flight so we can get a refund, if we see that the weather is clouding we will go out with the umbrella rather than risk taking all the water in the world.

However, when it comes to sensitive data, projects built and refined over months or years of hard work, when it comes to securing our company, the meshes of prudence inexplicably widen and we let anyone have the chance to bring a cyber attack to our detriment successfully.

Only 38% of companies managed to stop the attack before it happened.

Cybersecurity as a friend

We believe that it is essential to build not only a Cybersecurity system but a Cybersecurity strategy that allows companies to be constantly protected from any malicious attack.

If it is true - as it is true - that curing always costs much more than preventing, the need to equip oneself with systems that are periodically updated to block the most innovative and unknown malware becomes more and more urgent and urgent every day.

The Goodcode method

In order to allow our clients to sleep soundly and dedicate themselves with the usual passion and concentration exclusively to their business, we at Goodcode have prepared a method based on 4 distinct moments, which we have already tested and which has given us and those who have trusted us so much satisfaction:

  • Analysis: system modelling, zoning and asset classification;
  • Risk assessment and definition of security levels;
  • Optimization, design and implementation of any corrective measures.
  • Staff training

For more information you can consult the section dedicated to Cybersecurity or simply... write us. We would be happy to put your security systems to the test and give you a complete evaluation of what may be the holes that cybercriminals could access.

You want friendly software?