You have responsibility for overseeing the security of your data systems. It is 8 a.m. on a Monday morning and the phone is ringing off the hook. Several of your users attempted to access files critical to business operations, but instead of opening as anticipated, they receive a message stating that the files are encrypted and will be deleted unless payment is received by a stated deadline. What do you do?
The landscape of cyberattacks is constantly evolving. One threat that is increasing in both frequency and complexity is that of ransomware attacks. Under these threats, the attacker encrypts company data, making it inaccessible. The attacker then demands a “ransom” payment in order to provide the decryption key, often in bitcoin so that payment cannot be traced.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]