Ransomware: Keeping Your Association Safe from Online Predators

Ransomware may have finally replaced millennials as the most hated and feared thing in the modern office. As a millennial, I find this darkly refreshing; I’m less disliked than a criminal industry that extorted more than $1 billion from American businesses last year.

All jokes aside, ransomware is a serious issue and poses a threat to every organization.

Ransomware is a form of malware that infects your computer, encrypts your files, and then demands a ransom. In 2015, ransomware cost American companies about $1.5 million. As I said above, in 2016 that number grew to more than $1 billion. If this were a legitimate industry, we’d all be fools not to invest in this unbelievably fast-growing market.

Most antivirus/antimalware programs are inadequate to stop these attacks. There are more than 400 types of ransomware, and more are found every month. There are attacks that don’t just attack your computer; if you’re on a network, they attack your coworkers’ computers too. The FBI reports that ransoms generally fall between $200 and $5,000 – per user.

What Are We Going To Do About It?

If your office is not prepared for ransomware, you have two choices: pay the ransom or accept that you lost your data.

The problem with paying is that there is no guarantee that you will get your data back or that you won’t be attacked again immediately – you’ve already proven that you’re willing to pay to protect your information. The criminal might also leave a “backdoor” into your network, meaning that they’ll keep looking for data even after you’ve paid them to go away.

If you don’t pay the ransom, you lose your files. Generally, the targeted files are Word documents and image files. They know that people work predominantly in Word, and that most people have personal photos they can’t replace. Too often, people can’t afford not to pay the ransom because of the files they are at risk of losing.

While there are hundreds of specific “breeds” of ransomware, let’s just look at the three most common forms of ransomware delivery, and compare them to some natural predators.

Ransomware Attacks as a Snake, Spider or Shark

By thinking of ransomware as predators, avoiding the “pay or lose the data” choice becomes fairly easy.


Some ransomware is like a rattlesnake. It lets you know from a long way off what it is and to leave it alone.

Perhaps the most common form of ransomware-delivery is through an infected email. The email either has coding embedded in an image, or begs you to click a link that unleashes something horrible. Sometimes these emails look like they come from a loved one or coworker. Sometimes they look like they were composed by someone who briefly knew an English-speaking person and is now trying their hardest to remember basic sentence structure.

Regardless, if your friend is suddenly emailing you about a “great investment opportunity” or “Amish singles looking to mingle,” do not open the email or click the link. This is a rattlesnake, rattling as loudly and clearly as it can. Stay away.

You can avoid a lot of risk by investing in a decent spam filter for your email and antivirus for your computer. I know I said most antiviruses can’t stop ransomware, but you’ve got to have some form of defense, and an antivirus can stop some of the lower-level attacks.

You avoid rattlesnakes by listening to their rattle and then not provoking them. You can reduce the risk of attack by looking out for the telltale signs of ransomware – oddly worded emails or nonsensical messages from someone you know.

If you want to be sure that Aunt Maude really does have an “exciting business venture,” give her a call. It could save you a major headache. And remember: There are no Nigerian royals – ignore the deposed prince.


Some ransomware is like a spider. It hangs out in a scary place waiting to trap you.

There are websites we all know not to go to at work. For the most part, people do a good job of avoiding adult-themed websites, but viruses and ransomware don’t just hang out in the dark corners of the internet.

Without a doubt, the most common way I’ve seen people with decent spam filters get ransomware is by downloading a “free” service or product online. Cute screensavers have taken down more systems in my experience than any site intended for mature audiences.

Nothing on the internet is free. Nothing.

Download a pirated movie? You’ve broken the law and most likely been punished by the crook that enabled you.

Like a fly in a spider’s web, you’re pretty much stuck once you download an infected file. The trick is avoiding the webs. If you’re at work, stick to websites you know are trustworthy, and if you have to download something – Chrome or Firefox, for example – be sure that you’re on a reliable site when you hit that “download” button.


Some ransomware is like a shark. You can do everything right, swimming about as an innocent fish, and it’ll still seek you out and get you.

This is where the metaphor stops. Because unlike fish, you don’t die the moment you’re hit by a shark. And unlike fish, you can hide your most vital data in the cloud.

Ah, there’s that term again – the cloud.

Ransomware only works if your data is stored on your computer or your server. If it’s stored locally, cyber-criminals can lock you out. But if your data is saved offsite and on a server owned by a company that has one job – protecting your information – it’s much more likely to be secure. If a cyber-criminal goes through the trouble of attacking a major company, they honestly don’t care what information your average Texas association has. They’re going after Citibank or Target.

I store all my information in the cloud through a reputable service. If I were to be attacked by ransomware today, I wouldn’t pay a dime. I would wipe my computer, reset it and start working again within a couple hours. It would be inconvenient, but there is zero risk to my company or my wallet.

To recap:

  • Carefully listen for ransomware’s rattles. Avoid out-of-the-blue messages that make no sense.
  • Avoid the scary places online. If it’s free, it’s scary.
  • Prepare for the worst. Plan a move to the cloud, then follow through.

Author Dallas Emerson is a TSAE member and the Technical Sherpa for The IT Guys (www.itguysusa.com), an IT support firm in Austin that helps nonprofits. He can be reached at [email protected].
Photo credit: igorstevanovic/Shutterstock.com

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button