What is Ransomware?
Ransomware is a type of malicious software that, if installed, can stop you from gaining access to your systems and will then demand that you pay the perpetrator to regain access – in other words, it will hold your systems to ransom.
Ransomware can come in many shapes and sizes - below are a few of the most common types to be aware of, but if you'd rather get straight to finding out how to protect yourself and your company, skip to the takeaway actions.
- Crypto ransomware, also known as "encryptors", is one of the most common and dangerous types. This kind encrypts files and data, rendering the material useless without the decryption key. Unlike the other types below, crypto ransomware may infiltrate your systems in several different ways.
- Phishing refers to one of the methods in which ransomware may make its way into your system. It occurs when a malicious email, which may appear at first to be authentic, is opened and the links within are clicked on. Unfortunately, opening these all but friendly emails will allow the ransomware to be downloaded onto your device. Once in, the ransomware can exploit the security flaws in your device and take control of your systems.
- Scareware may often appear as a security software pop-up, warning you that malware has been identified and that the only way to remove it is to pay. However, despite the name, there is often nothing to be afraid of as attackers are merely bluffing to coerce you into paying, meanwhile your files remain secure.
- Doxware or Leakware refers to when an attacker threatens to release sensitive data online. Although the threat may not always be legitimate, most individuals panic and pay the requested ransom.
- Lockers refers to when a pop-up emerges, requesting for a ransom and totally locks the user out of their computer. Most pop-ups make the user feel like they are in the wrong and will often display timers to pressure you into paying quickly without having the opportunity to report or resolve the attack instead.
The Prevalence of Attacks and Data Recovery after an attack
94%
46%
61%
4%
#1
Ransom Payments
$812,360
21%
$2m
$197k
Business Impact
64%
86%
$1.4m
1 month
Takeaway Actions

Optimise Prevention

Reduce Exposure

Disrupt Attackers
We can help you
- Optimize prevention: Intercept X blocks 99.98% of threats automatically out of the gate, minimising risk and enabling defenders to focus on fewer incidents that require human intervention.
- Reduce exposure: Optimal protection settings are deployed automatically from day one, eliminating security gaps. Built-in Account Health Checks highlight missing software and configuration issues that can lead to avoidable infections.
- Disrupt adversaries: Adaptive Active Adversary Protection immediately activates heightened defenses when a “hands-on-keyboard” endpoint intrusion is detected, frustrating attackers and buying defenders time to respond.