{"id":7876,"date":"2017-05-16T19:35:27","date_gmt":"2017-05-16T19:35:27","guid":{"rendered":"https:\/\/www.zunesis.com\/?p=7876"},"modified":"2017-05-16T19:35:27","modified_gmt":"2017-05-16T19:35:27","slug":"blog_data_safe_ransomware_attack","status":"publish","type":"post","link":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/","title":{"rendered":"Is Your Organization\u2019s Data Safe from a Ransomware Attack?"},"content":{"rendered":"<h5>Though not a new phenomenon, ransomware has made some serious headlines this week.<\/h5>\n<p>&nbsp;<\/p>\n<p>With the recent wave of Ransomware attacks, it is becoming increasingly important for organizations to protect themselves and their sensitive data.<\/p>\n<p>&nbsp;<\/p>\n<p>There are different types of ransomware.\u00a0They can target any PC users \u2013 whether it\u2019s a home computer, endpoints in an enterprise network, or servers used by a government agency or healthcare provider.<\/p>\n<p>&nbsp;<\/p>\n<h6>Ransomware can:<img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-7879 alignright\" src=\"https:\/\/www.zunesis.com\/wp-content\/uploads\/2017\/05\/Hooded-hacker-300x200.jpg\" alt=\"Ransomware hacker\" width=\"300\" height=\"200\" \/><\/h6>\n<p>&nbsp;<\/p>\n<ul>\n<li>Prevent you from accessing Windows,<\/li>\n<li>Encrypt files so you can&#8217;t use them,<\/li>\n<li>Stop certain apps from running (like your web browser).<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Ransomware will demand that you pay money (a \u201cransom\u201d) to get access to your PC or files.\u00a0However, there is no guarantee that paying the fine or doing what the ransomware tells you will give access to your PC or files again.<\/p>\n<p>&nbsp;<\/p>\n<p>Microsoft provides a complete portfolio of Cloud services to protect your data from these types of attacks.\u00a0One of our specialties is helping customers transition from on premise to either hybrid or full cloud environments.\u00a0Often, customers just do not know where to start. We have a complimentary assessment that can establish the basics called a \u201cCloud Migration Health Check,\u201d by which we can provide you with a report outlining current on premises investments compared to what those same investments would cost in the cloud, highlighting cost savings in the process.<\/p>\n<p>&nbsp;<\/p>\n<p>In light of this week\u2019s events, (<a href=\"https:\/\/blogs.technet.microsoft.com\/msrc\/2017\/05\/12\/customer-guidance-for-wannacrypt-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">WannaCry<\/a>), would it be worth a few minutes of your time to review your current environment and projects to see if Microsoft Cloud and Microsoft Office 365 &amp; Azure would be a good fit for your organization?<\/p>\n<p>&nbsp;<\/p>\n<p>Please <a href=\"https:\/\/www.zunesis.com\/contact\">contact us<\/a> to learn more on how Microsoft dedicated Office 365 and Azure: Storage, Backup, and Disaster Recovery solutions can help optimize and protect your IT investments.<\/p>\n<p><span style=\"font-family: 'Calibri',sans-serif; font-size: 11pt;\"><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/p>\n<p><span style=\"color: #000000; font-family: Calibri;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Though not a new phenomenon, ransomware has made some serious headlines this week. &nbsp; With the recent wave of Ransomware attacks, it is becoming increasingly important for organizations to protect themselves and their sensitive data. &nbsp; There are different types of ransomware.\u00a0They can target any PC users \u2013 whether it\u2019s a home computer, endpoints in [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7878,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,11],"tags":[18,39,15,40,30,41,42],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Your Organization\u2019s Data Safe from a Ransomware Attack?<\/title>\n<meta name=\"description\" content=\"Are this week&#039;s WannaCry headlines making you question how protected you are from ransomware attacks? Don&#039;t wait until it&#039;s too late to find out.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Your Organization\u2019s Data Safe from a Ransomware Attack?\" \/>\n<meta property=\"og:description\" content=\"Are this week&#039;s WannaCry headlines making you question how protected you are from ransomware attacks? Don&#039;t wait until it&#039;s too late to find out.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/\" \/>\n<meta property=\"og:site_name\" content=\"NDM\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-16T19:35:27+00:00\" \/>\n<meta name=\"author\" content=\"NDM Writing Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NDM Writing Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/\",\"url\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/\",\"name\":\"Is Your Organization\u2019s Data Safe from a Ransomware Attack?\",\"isPartOf\":{\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#website\"},\"datePublished\":\"2017-05-16T19:35:27+00:00\",\"dateModified\":\"2017-05-16T19:35:27+00:00\",\"author\":{\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#\/schema\/person\/9de29608b90d04fc74ddb6963b1658b0\"},\"description\":\"Are this week's WannaCry headlines making you question how protected you are from ransomware attacks? Don't wait until it's too late to find out.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Your Organization\u2019s Data Safe from a Ransomware Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#website\",\"url\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/\",\"name\":\"NDM\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#\/schema\/person\/9de29608b90d04fc74ddb6963b1658b0\",\"name\":\"NDM Writing Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7c66ad8f88da1ee6de1e404bfb9c1a50?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7c66ad8f88da1ee6de1e404bfb9c1a50?s=96&d=mm&r=g\",\"caption\":\"NDM Writing Team\"},\"url\":\"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/author\/ndm-author\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Your Organization\u2019s Data Safe from a Ransomware Attack?","description":"Are this week's WannaCry headlines making you question how protected you are from ransomware attacks? Don't wait until it's too late to find out.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Is Your Organization\u2019s Data Safe from a Ransomware Attack?","og_description":"Are this week's WannaCry headlines making you question how protected you are from ransomware attacks? Don't wait until it's too late to find out.","og_url":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/","og_site_name":"NDM","article_published_time":"2017-05-16T19:35:27+00:00","author":"NDM Writing Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NDM Writing Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/","url":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/","name":"Is Your Organization\u2019s Data Safe from a Ransomware Attack?","isPartOf":{"@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#website"},"datePublished":"2017-05-16T19:35:27+00:00","dateModified":"2017-05-16T19:35:27+00:00","author":{"@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#\/schema\/person\/9de29608b90d04fc74ddb6963b1658b0"},"description":"Are this week's WannaCry headlines making you question how protected you are from ransomware attacks? Don't wait until it's too late to find out.","breadcrumb":{"@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/2017\/05\/16\/blog_data_safe_ransomware_attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/"},{"@type":"ListItem","position":2,"name":"Is Your Organization\u2019s Data Safe from a Ransomware Attack?"}]},{"@type":"WebSite","@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#website","url":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/","name":"NDM","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#\/schema\/person\/9de29608b90d04fc74ddb6963b1658b0","name":"NDM Writing Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7c66ad8f88da1ee6de1e404bfb9c1a50?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7c66ad8f88da1ee6de1e404bfb9c1a50?s=96&d=mm&r=g","caption":"NDM Writing Team"},"url":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/blog\/author\/ndm-author\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/posts\/7876"}],"collection":[{"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/comments?post=7876"}],"version-history":[{"count":0,"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/posts\/7876\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/media?parent=7876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/categories?post=7876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ccreativellc.com\/clients\/ndmtechstg\/wp-json\/wp\/v2\/tags?post=7876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}