{"id":266,"date":"2017-08-09T10:19:36","date_gmt":"2017-08-09T14:19:36","guid":{"rendered":"https:\/\/www.amp.legal\/blog\/?p=266"},"modified":"2017-10-17T12:16:22","modified_gmt":"2017-10-17T16:16:22","slug":"a-ransomware-infection-risks-business-health","status":"publish","type":"post","link":"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/","title":{"rendered":"Ransomware Infection Risks Business Health"},"content":{"rendered":"<p>Ransomware is a menacing cyber threat because it exposes a business to cyber extortion. A ransomware infection can harm a business by opening up its legal risks and shutting down its operations.<\/p>\n<p>Ransomware is a form of malicious software that encrypts the files on a victim\u2019s computer. After the files are locked, a message appears that demands a payment for the decryption key.<\/p>\n<p>Any type of business can be a ransomware target. In April 2017, <a href=\"https:\/\/www.cyberscoop.com\/ransomware-demands-now-average-1077-many-people-deciding-pay\/\" target=\"_blank\" rel=\"noopener noreferrer\">CyberScoop.com<\/a> reported that the average ransomware payment averages around $1,000. If a data backup is not available, the victim must decide whether to pay the ransom, or the victim will have to accept that the locked files are useless. Unless the victim obtains the decryption key, the files will remain unreadable.<\/p>\n<h3><strong><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-268 alignleft\" style=\"float: left; padding-right: 1em;\" src=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/Lock_key-300x251.png\" alt=\"\" width=\"300\" height=\"251\" srcset=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/Lock_key-300x251.png 300w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/Lock_key-768x643.png 768w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/Lock_key-700x586.png 700w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/Lock_key-520x436.png 520w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/Lock_key-360x302.png 360w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/Lock_key-250x209.png 250w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/Lock_key-100x84.png 100w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/Lock_key.png 900w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><strong>How Ransomware Spreads<\/strong><\/strong><\/h3>\n<p>Ransomware gets into a computer through sneaky methods such as drive-by downloads and social engineering. If a computer system is not setup for automatic updates, it will be extremely vulnerable to becoming infected with ransomware. Usually, ransomware is delivered from a malicious website that exploits a security flaw in the victim\u2019s device. The security hole causes the victim\u2019s device to download the malware. Ransomware is also spread with malicious links through social engineering, which includes phishing (email), vishing (phone), and smishing (text message).<\/p>\n<p>Newer generations of ransomware have taken on aspects of a worm, such as WannaCry ransomware. A worm has the ability to spread across a network to many other systems. Ransomware can also be polymorphic, which means it re-encrypts or modifies itself so that the new hash value of the code differs from any signature that could be recognized by a scanner.<\/p>\n<p>Ransomware can be custom-designed and targeted at a certain business. A business that handles sensitive information is a prime target for a high-dollar ransom demand. Ransomware-as-a-Service (RaaS) is available on the dark web where buyers can order customized crypto-malware. Also, RaaS platforms are available on the open web through service kits, web projects, and affiliate programs. As a result, the amount of ransomware in circulation on the web continues to increase.<\/p>\n<h3><strong>Legal Hazards of Ransomware<\/strong><\/h3>\n<p>A ransomware infection might expose a business to legal liabilities. Downtime of business operations can lead to legal actions, which includes lawsuits for breach of contract and negligence. Additionally, <a href=\"https:\/\/www.amp.legal\/data_breach_law_tool\/\" target=\"_blank\" rel=\"noopener noreferrer\">state data breach laws<\/a> could classify the ransomware attack as a breach and require notification to affected individuals, credit bureaus, and state agencies.<\/p>\n<p>To mitigate expenses from an attack, a business could obtain cyber insurance. The policy should include cyber extortion coverage for ransomware. Also, the policy should have regulatory coverage for legal compliance and fines. However, a business manager should pay close attention to the terms in the policy. For example, the policy may require the insured to immediately contact the insurer before paying a ransom. Also, to receive payment for a claim, the business must be in compliance with any policy requirements, such as having performed a security penetration test on the network.<\/p>\n<h3><strong>Ransomware Prevention and Recovery<\/strong><\/h3>\n<p>Managers should be proactive to protect a business from ransomware, such as conducting a cyber security assessment and preparing a contingency plan if infected. The most effective measures are automatic system updates and automated daily backups. For added protection, every computer should have anti-malware software installed on its hard drive.<\/p>\n<p>Being prepared is the best way to avoid a ransomware infection. As a hopeful sign, decryption keys for some infections are available on the web, such as <a href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">NoMoreRansom.org<\/a>, which provides a repository of keys to decrypt data locked by ransomware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is a menacing cyber threat because it exposes a business to cyber extortion. A ransomware infection can harm a business by opening up its legal risks and shutting down its operations. Ransomware is a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":267,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[37,39,26,38],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Infection Risks Business Health - Cyber Law Blog<\/title>\n<meta name=\"description\" content=\"Ransomware exposes a business to cyber extortion. A ransomware infection can harm a business by opening up its legal risks and shutting down its operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Infection Risks Business Health - Cyber Law Blog\" \/>\n<meta property=\"og:description\" content=\"Ransomware exposes a business to cyber extortion. A ransomware infection can harm a business by opening up its legal risks and shutting down its operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Law Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-09T14:19:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-17T16:16:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/Clear-Monitors.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/\"},\"author\":{\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\"},\"headline\":\"Ransomware Infection Risks Business Health\",\"datePublished\":\"2017-08-09T14:19:36+00:00\",\"dateModified\":\"2017-10-17T16:16:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/\"},\"wordCount\":594,\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"keywords\":[\"cyber extortion\",\"malware\",\"ransomware\",\"worm\"],\"articleSection\":[\"Ransomware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/\",\"name\":\"Ransomware Infection Risks Business Health - Cyber Law Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\"},\"datePublished\":\"2017-08-09T14:19:36+00:00\",\"dateModified\":\"2017-10-17T16:16:22+00:00\",\"description\":\"Ransomware exposes a business to cyber extortion. A ransomware infection can harm a business by opening up its legal risks and shutting down its operations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.amp.legal\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Infection Risks Business Health\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"name\":\"Cyber Law Blog\",\"description\":\"Exploring technology law in cyberspace\",\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.amp.legal\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\",\"name\":\"Alice M. Porch, P.A.\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"contentUrl\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"width\":1104,\"height\":1114,\"caption\":\"Alice M. Porch, P.A.\"},\"image\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\",\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"caption\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\"},\"description\":\"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.\",\"sameAs\":[\"https:\/\/www.aliceporch.com\",\"https:\/\/www.linkedin.com\/in\/alice-m-porch\/\"],\"url\":\"https:\/\/www.amp.legal\/blog\/author\/amplegal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Infection Risks Business Health - Cyber Law Blog","description":"Ransomware exposes a business to cyber extortion. A ransomware infection can harm a business by opening up its legal risks and shutting down its operations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Infection Risks Business Health - Cyber Law Blog","og_description":"Ransomware exposes a business to cyber extortion. A ransomware infection can harm a business by opening up its legal risks and shutting down its operations.","og_url":"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/","og_site_name":"Cyber Law Blog","article_published_time":"2017-08-09T14:19:36+00:00","article_modified_time":"2017-10-17T16:16:22+00:00","og_image":[{"width":900,"height":525,"url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/Clear-Monitors.png","type":"image\/png"}],"author":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/#article","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/"},"author":{"name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f"},"headline":"Ransomware Infection Risks Business Health","datePublished":"2017-08-09T14:19:36+00:00","dateModified":"2017-10-17T16:16:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/"},"wordCount":594,"publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"keywords":["cyber extortion","malware","ransomware","worm"],"articleSection":["Ransomware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/","url":"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/","name":"Ransomware Infection Risks Business Health - Cyber Law Blog","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/#website"},"datePublished":"2017-08-09T14:19:36+00:00","dateModified":"2017-10-17T16:16:22+00:00","description":"Ransomware exposes a business to cyber extortion. A ransomware infection can harm a business by opening up its legal risks and shutting down its operations.","breadcrumb":{"@id":"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.amp.legal\/blog\/a-ransomware-infection-risks-business-health\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.amp.legal\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware Infection Risks Business Health"}]},{"@type":"WebSite","@id":"https:\/\/www.amp.legal\/blog\/#website","url":"https:\/\/www.amp.legal\/blog\/","name":"Cyber Law Blog","description":"Exploring technology law in cyberspace","publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amp.legal\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.amp.legal\/blog\/#organization","name":"Alice M. Porch, P.A.","url":"https:\/\/www.amp.legal\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","contentUrl":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","width":1104,"height":1114,"caption":"Alice M. Porch, P.A."},"image":{"@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f","name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","caption":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+"},"description":"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.","sameAs":["https:\/\/www.aliceporch.com","https:\/\/www.linkedin.com\/in\/alice-m-porch\/"],"url":"https:\/\/www.amp.legal\/blog\/author\/amplegal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/266"}],"collection":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/comments?post=266"}],"version-history":[{"count":18,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/266\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/266\/revisions\/301"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media\/267"}],"wp:attachment":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media?parent=266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/categories?post=266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/tags?post=266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}