[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/www.the-future-of-commerce.com\/2016\/05\/04\/malware-attacks-security-preparedness\/#BlogPosting","mainEntityOfPage":"https:\/\/www.the-future-of-commerce.com\/2016\/05\/04\/malware-attacks-security-preparedness\/","headline":"Malware attacks: Ransomware infection at the weakest point","name":"Malware attacks: Ransomware infection at the weakest point","description":"Malware attacks are happening more often. With so much data and privacy laws, are you ready to deal with a potential data breach?","datePublished":"2016-05-04","dateModified":"2021-12-28","author":{"@type":"Person","@id":"https:\/\/www.the-future-of-commerce.com\/contributor\/dean-afzal\/#Person","name":"Dean Afzal","url":"https:\/\/www.the-future-of-commerce.com\/contributor\/dean-afzal\/","identifier":96,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/5d49f62f414d1e47fe8e3fbc00be870c1ef013abff0c510cad25a5ea62f153b7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5d49f62f414d1e47fe8e3fbc00be870c1ef013abff0c510cad25a5ea62f153b7?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"The Future of Commerce","logo":{"@type":"ImageObject","@id":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2023\/01\/logo-foc-schema-app-1.png","url":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2023\/01\/logo-foc-schema-app-1.png","width":172,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2016\/05\/thumbnail-431b76564bfaa2caa0157271432b90bd-1.png","url":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2016\/05\/thumbnail-431b76564bfaa2caa0157271432b90bd-1.png","height":370,"width":1200},"url":"https:\/\/www.the-future-of-commerce.com\/2016\/05\/04\/malware-attacks-security-preparedness\/","about":[{"@type":"Thing","@id":"https:\/\/www.the-future-of-commerce.com\/commerce\/","name":"Commerce","sameAs":["https:\/\/en.wikipedia.org\/wiki\/Commerce","http:\/\/www.wikidata.org\/entity\/Q26643"]},{"@type":"Thing","@id":"https:\/\/www.the-future-of-commerce.com\/customer-experience\/customer-data\/","name":"Customer Data","sameAs":["https:\/\/en.wikipedia.org\/wiki\/Customer_data","http:\/\/www.wikidata.org\/entity\/Q56278300"]},{"@type":"Thing","@id":"https:\/\/www.the-future-of-commerce.com\/commerce\/intelligent-enterprise\/","name":"Intelligent Enterprise","sameAs":["https:\/\/en.wikipedia.org\/wiki\/Intelligent_enterprise","http:\/\/www.wikidata.org\/entity\/Q6044119"]}],"wordCount":701,"keywords":["Cybersecurity","Malware","Phishing"],"articleBody":"Earlier this year, a hospital in Kentucky declared an \u201cInternal State of Emergency\u201d because of an email-based cyber-attack that saw many of its crucial files encrypted by a malware attachment. The perpetrators demanded payment to unlock the data, and the hospital had to revert to a paper-based system while its IT staff worked with the FBI to solve the problem. This sort of malware attack is becoming more and more common.This hospital\u2019s misfortune was not an isolated case \u2013 two medical centers in California were infected during the same week in similar ways.Ransomware attacks are happening with increasing frequency, and are a cause of concern for any organization that uses networks, email, and internet connectivity. In other words, everyone. These incidents demonstrate just how easy it can be to bring a major institution to its knees.      Why data security is critical to the future of CX                No technology can overcome the fact that the customer experience is a human endeavor. Learn why data security is critical to the future of CX.      Malware, unfortunately, is a reality of modern commerceWhether we work in the public or private sector, large or small scale, whether we sell auto parts or medical expertise, we are all tied together, using global network resources that touch almost every point on the planet, and connect everyone together.Ransomware attacks are launched from inside an organization when an unsuspecting individual receives an email that includes two components. The first is a manipulative element of fear or surprise and the second is an attachment that carries an executable virus. When an employee reads an email that includes an invoice statement, or an urgent notice about a frozen bank account with a \u201cclick here\u201d link, there is little time for thought. The attachment is opened, and the\u00a0 digital invasion begins.Companies spend billions annually on IT and data security to avoid a data breach. Sophisticated tools keep track of weaknesses and intrusions in a perpetual game of cat and mouse with black hat organizations that could be lurking around the corner or on another continent. But, one factor is often overlooked in even the most secure of businesses: the time-challenged human worker.Most employees, whether they work behind a desk, on a shop floor, or on the road, generally feel overburdened. Emails pour in, and the expectation is that they should be answered immediately whether from a desktop or a smartphone \u2013 making them prime victims of a malware attack.Acting without thinking is the culprit. To act without thinking means reacting reflexively with no opportunity to stop and ask \u201cwhy am I doing this?\u201d or &#8220;is this legitimate?&#8221;These sinister emails simply appear as one part of a never-ending inbox queue. The pressure to answer them quickly and get back to real work means people cast judgment aside, and that is where the trouble is rooted.      What is a data breach: definition, examples, consequences, costs                A data breach can have massive consequences for organizations and individuals. Discover data breach examples, consequences, costs, and security measures you can take to prevent the exposure of data to hackers.      The future of commerce depends on the ability of people to stay alert and street-smartThis is about staying conscious of your environment and not falling prey to careless reactionism. It demands processes and procedures where employees move systematically from task to task with adequate time to take a breath. It requires time management and team management skills that support and encourage mindfulness.Such a climate is not a &#8220;nice to have&#8221; but a &#8220;must have.&#8221; And, it translates directly into a technology requirement because the result of a calm mindset in place of a distracted one may mean the difference between an IT system or commerce platform that is working properly, and one that falls unintentionally into crisis.Ransomware might be the creation of an outside force, but in many cases, it is released into a system through the actions of someone on the inside. Proactively training your staff members to slow down and think things through is relatively inexpensive and easy.  Your competitionwants your customers.Is your brand built to keep them?Unlock strategies to power your enterprise HERE."},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"2016","item":"https:\/\/www.the-future-of-commerce.com\/2016\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"05","item":"https:\/\/www.the-future-of-commerce.com\/2016\/\/05\/#breadcrumbitem"},{"@type":"ListItem","position":3,"name":"04","item":"https:\/\/www.the-future-of-commerce.com\/2016\/\/05\/\/04\/#breadcrumbitem"},{"@type":"ListItem","position":4,"name":"Malware attacks: Ransomware infection at the weakest point","item":"https:\/\/www.the-future-of-commerce.com\/2016\/05\/04\/malware-attacks-security-preparedness\/#breadcrumbitem"}]}]