cyber and physical security

How do you respond if a hacker threatens to hold your website ransom or a malicious malware takes control of your company’s computer system?

While we have seen that there are people willing to pay the sum demanded to retrieve what they have lost, many others have the strength to say no. Some refused due to ethical reasons while the rest refused for more practical reasons.

Below, we will have a look at real-life scenarios where victims refused to pay up when faced with a ransom attack.


Victims will never know if the threat is real

Threats easily intimidate anybody, especially when they are empty “promises”. With a little skill and creativity on the keyboard, these hackers can simply be imposters who are cashing in on businesses’ willingness to pay. An attack can be easy for the attacker. The attackers can display a hack quickly and cheaply. Making a fake threat can be just as dangerous as a real one.


They have no idea what a bitcoin is

Usually once the ransom deal is agreed, one of the demands made by the attacker is for the payment to be transferred via cryptocurrency – a currency where most victims have not heard of bitcoin before and have no idea how to deal with it. In the end, many decided to ignore the threat eventually.


Let the authorities handle the situation

Just like a kidnapping scenario, the attacker will have the upper hand once they sense an uncontrollable fear on the other side. When the victim goes to the authorities, however, their perception and confidence will change. In this instance, they let the police find the culprit; because they always do.


They will never go away and they will ask for more

Paying the ransom might not guarantee your company’s release from the attacker. In fact,your obedience might even encourage them to make a bold move for higher protection money in the future.


News will spread and it’s bad

You were threatened, got scared, decided to pay the ransom and hope that this nightmare will go away. Well, prepare yourself to keep paying because news of paid victims will spread within the ransomware circle and other hackers will be interested in making your company their next victim.


Stand up against them! But how?


The solution

Some companies are aware of these ongoing threats and have strong and effective cybersecurity measures in place to prevent a successful attack. In fact, these companies are always on the lookut for the right security measures against any attacks and how to quickly recover from a locked system. One such IT solution company that can do that and more is Global ITN.

Global ITN provides a strong and secure IT defense mechanisms to protect you against hackers and their malicious attacks. IT security takes a critical role in augmenting the surveillance of data transfer across your IT system. And with the best suitable security solutions from us, rest assured that your data is protected from any immediate danger.


What Global ITN offers:

  • Penetration testing consultancy.
  • The rule set changes and validation.
  • Configuration changes.
  • Firewall upgrades.
  • Patch management.
  • General maintenance.
  • Backup and recovery.
  • 24×7 security event monitoring.
  • Performance and availability management.
  • Strategic network planning.
  • Fault analysis.
  • On-demand report.