{"id":257,"date":"2017-04-07T13:25:57","date_gmt":"2017-04-07T13:25:57","guid":{"rendered":"http:\/\/esolutions.lt\/blog\/?p=257"},"modified":"2017-06-16T09:43:30","modified_gmt":"2017-06-16T09:43:30","slug":"small-and-medium-size-businesses-have-become-the-main-targets-of-ransomware","status":"publish","type":"post","link":"https:\/\/esolutions.lt\/blog\/small-and-medium-size-businesses-have-become-the-main-targets-of-ransomware\/","title":{"rendered":"Small and medium size businesses have become the main targets of ransomware"},"content":{"rendered":"<p>Recently, security experts reported about a new tendency showing that small and medium size businesses have become the main targets of ransomware authors. The explanation is very simple: scammers are aware of the fact\u00a0that employees are curious creatures who can hardly resist the temptation to look at the attachment sent to them by\u00a0an unknown\u00a0sender. Besides, they know that after using the virus to\u00a0encrypt the entire network of the company they can make more &#8211; owners of small and medium size businesses are much\u00a0more vulnerable than home users, so they are ready to pay larger sums. However, you should NEVER think about paying a ransom to cyber criminals because you can be left with no money and no files.<\/p>\n<p>Last month\u00a0was\u00a0especially active\u00a0for hackers trying to mislead random companies and infect them with <a href=\"http:\/\/www.2-spyware.com\/remove-spora-ransomware-virus.html\">Spora<\/a>, <a href=\"http:\/\/www.2-spyware.com\/remove-btc-ransomware-virus.html\">BTC ransomware<\/a>, and many others. To\u00a0make\u00a0their employees to\u00a0open an infected\u00a0attachment and\/or extract the attached\u00a0file, they have set a bunch of spam campaigns using such titles: <em>Office, Support, Sales, Cleints, Credit Control, Customer Support<\/em>, etc. Beware that such emails are usually filled with real companies, telephone numbers, names and addresses, so you can easily find them on Google. However, these people have no idea that someone has just started using their names and similar information to mislead users and infect them with malware. Before opening the attachment, you should try to contact the sender first. Also,\u00a0enable the\u00a0protected view and disable macros on your and colleagues computers to protect yourself from <a href=\"http:\/\/www.2-spyware.com\/social-engineering-what-is-it-and-how-to-prevent-it\">social engineering.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, security experts reported about a new tendency showing that [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":259,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/257"}],"collection":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/comments?post=257"}],"version-history":[{"count":1,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/257\/revisions"}],"predecessor-version":[{"id":258,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/257\/revisions\/258"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/media\/259"}],"wp:attachment":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/media?parent=257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/categories?post=257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/tags?post=257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}