logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search

Why having backups may give you a false sense of security

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″ custom_padding=”0px|||||” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on” da_disable_devices=”off|off|off”][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Just because you have backed up all of your important data doesn’t mean that a ransomware attack can’t cause severe consequences for you. Up until now, most people have felt that the worst that could happen is to lose access to their data if they are hit by a ransomware attack.

But a recent shift in tactics by attackers is making people think twice about not paying up. While you may not care about getting access to the data they’ve encrypted, they are betting there is still a lot of value in that data. And they might be right.

If they can encrypt your data, they can do anything with it

Think about all of the data on your computer, and what the impact might be if it were made public or given to certain people. Perhaps there is financial information, login details to important websites you use, or even potentially embarrassing content or messages you wouldn’t want others to know about.

If the attackers can access your drive to the extent that they can encrypt all the data, there’s no reason they can’t copy the data before they encrypt it. Now, do I have your attention?

It’s a much bigger problem than you might think

How many press releases have you seen about ransomware breaches experienced by organizations that say, “There is no evidence that any of the affected information has been abused in any way.” This is a legal defence mechanism to ease people’s concerns about the risks to them. It is a very weak argument, as the attacker may well intend to use the data for extortion if the organization doesn’t pay… or maybe even if they do pay.

I call this “double dipping”.  You might not need to pay the ransom to get access to the data they’ve encrypted, but you might very well want to pay to keep it from being disclosed to others. And once they have your data, they might keep coming back to get paid not to release it again and again…

This is another very good reason to take extra precautions against becoming infected with ransomware in the first place. Once infected, your data might become an open book.

Click Armor ‘s gamified phishing awareness course is a great way to learn about how to avoid clicking on dangerous links that can lead to ransomware infections.

A good example of how much damage this can cause is illustrated in the Sony Pictures security breach and data disclosures.

Get the Click Armor Gamified Phishing Course
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column _builder_version=”4.4.6″ type=”4_4″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]

Share this article

[vc_empty_space height=”10px”]
[elfsight_social_share_buttons id=”1″]

Recent Posts

  • 0
    Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve
    June 16, 2025
  • 0
    Addressing AI opportunities and risks in your cyber security program
    March 13, 2025
  • 0
    What makes cyber security training boring
    March 3, 2025
  • 0
    A Canadian cybersecurity company’s lessons on training
    February 20, 2025
  • 0
    Cyber security training for executives: Why and how
    February 6, 2025
Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use