The day begins like any other. Your client opens for business at 9:00 a.m. All employees are at their desks as customers begin calling, emailing, and walking in with various questions and needs. Except this time, when the employees attempt to access customer records from your client’scomputer network, they immediately notice something is wrong. None of the customer files will open. The data is a garbled mess. When one of the IT employees checks the network, an ominous message appears on the screen:
YOUR NETWORK HAS BEEN ENCRYPTED. CONTACT THIS NUMBER WITHIN 10 DAYS TO RECEIVE FURTHER INSTRUCTIONS ON HOW TO TRANSMIT PAYMENT FOR THE ENCRYPTION KEY.
Join Us On LinkedIn
Join the Cybersecurity and Incident Response Group on LinkedIn