Is your company at risk from ransomware?


Ransomware came to prominence in 2013, with the rise of the original CryptoLocker malware. Most ransomware uses the AES algorithm to encrypt files. To decrypt files, hackers typically request payment in the form of Bitcoins or alternate online payment voucher services. Forms of Ransomware Jigsaw, a form of ransomware, encrypts then progressively deletes files until […]