What is Ransomware and how to protect my company

Information is probably the most valuable and delicate thing we have in a company. Losing or making available to others certain data, files or confidential information could lead to terrible consequences for the organization.

The need to digitalize the company’s information, either in its computer equipment or in the cloud, exposes us to risks that we must reduce to the maximum.

One of the areas of concern in the field of computer security that has grown the most in recent years is known as Ransomware , which consists of the ‘hijacking’ of our files . The most common method is to encrypt, by means of an encryption or key that only the hacker knows, our data so that we can not access them, leaving the unused equipment in many cases. Like any kidnapping, the responsible hackers will ask for a ransom so that the company can recover its information again

Given the seriousness of the loss of files by hackers, companies are increasingly protected from attacks by protecting their computer systems internally and by hiring security services that give them the peace of mind to work daily while minimizing risks.

The initial strategy should focus on protection against all types of malware , something that goes through processes such as software updates, security or antimalware patches, and the installation of security software so that servers or e-mail are as good as possible. possible insurance.

It is also essential that the company’s employees themselves are aware of what practices are advisable for good security of their computer system, such as password access to their session, the download of secure programs, the closure of online account sessions or the Analysis of any external element that accesses your equipment (external hard drives, pen-drives, etc.).

Last but not least, it is essential to implement recovery measures and contingency plans in case you have a problem of this type, such as backup copies or having the most important information distributed in several places.


The most common form of infection of this type is via spam or spam , in the form of an attachment or link that will make us download a file on our computer (downloader) that will open the door to the malware in question.

This email can be in the form of a refund, a receipt, an invoice … and generally simulating as a sender a company or organization known as the postal service or a courier company.

Once the malware has been executed, the device will be blocked and we will request the payment of a certain amount to regain control of it and recover the hijacked files.

At this point, sometimes the hacker poses as a body or security force of the State to coerce us to pay and prevent us from reporting the problem, threatening us with greater sanctions or judicial problems

At this point we must bear in mind that the payment of ransom not only does not guarantee that we recover the files , since in many cases after making the same request more money, but we will be funding and promoting this type of activities .


 A first protection filter is that the company can establish different rights of access to the most sensitive files in the organization for each user, so that not all professionals can see or modify the information, thus limiting the scope of an attack in employee profile function.

Logically, if we want to avoid the loss or ‘sequestration’ of information, it will be essential to have backup copies or backups of our data, both in local devices and in remote systems.

Add a Comment

Your email address will not be published. Required fields are marked *