PREVENT Don’t Reactstatic.us.zyxel.com/landing_page/2017/ransomware/Ransomware_Inf… · paid in...

1
paid in ransom by companies in Q1 $209 Million NEW families of ransomware 62 ransomware modifications by end of Q3 54,000 Ransomware Attacks Daily Don’t Let Your Device Become a Hostage R a n S W a r E O m With the advancements of internet and technology, it is now a digital world. Our most vital and confidential information is aggregated to our computers and devices. This has become an extremely lucrative resource for hackers by employing ransomware, targeting end users and companies. Sources: Federal Bureau of Investigation: "Ransomware Prevention and Response for CISOs" Kaspersky Security Bulletin Statistics 2016 Powered by Zyxel USG Learn more at http://onesecurity.zyxel.com/ Opening Suspicious Email Attachments Malicious Web Links Clicking on Malicious Advertisements Installing Software Install Anti-Spam Software Content Filter Install Anti-Virus Instusion Detection and Protection System (IDP) Methods of Intrusion 1 2 3 4 WARNING PROCEED WITH CAUTION PREVENT Don’t React 1 2 3 4 1,000 2015 4,000 2016

Transcript of PREVENT Don’t Reactstatic.us.zyxel.com/landing_page/2017/ransomware/Ransomware_Inf… · paid in...

Page 1: PREVENT Don’t Reactstatic.us.zyxel.com/landing_page/2017/ransomware/Ransomware_Inf… · paid in ransom by companies in Q1 $209 Million NEW families of ransomware 62 ransomware

paid in ransomby companies

in Q1

$209Million

NEW families ofransomware

62ransomware

modificationsby end of Q3

54,000

RansomwareAttacks Daily

Don’t Let Your Device Become a Hostage

R a n S W a r EO m

With the advancements of internet and technology, it is now a digital world. Our most vital and confidential information is aggregated to our computers and devices. This has become an extremely lucrative resource for hackers

by employing ransomware, targeting end users and companies.

Sources:Federal Bureau of Investigation:"Ransomware Prevention and Response for CISOs"Kaspersky Security Bulletin Statistics 2016

Powered by Zyxel USGLearn more at http://onesecurity.zyxel.com/

Opening SuspiciousEmail Attachments Malicious Web Links

Clicking on MaliciousAdvertisements Installing Software

InstallAnti-SpamSoftware

ContentFilter

InstallAnti-Virus

InstusionDetection and

ProtectionSystem (IDP)

Methods of Intrusion

1 2 3 4

W A R N I N G P R O C E E D W I T H C A U T I O N

PREVENTDon’t React

1 2 3 4

1,000

2015

4,000

2016