• Skip to primary navigation
  • Skip to main content
  • About
  • Team
  • Industries
  • Products
  • News
  • Case Studies
  • Portal
  • Pay Now

Advantage Technology

Advantage Tech logoAdvantage Tech logo light

Cybersecurity & Managed IT Service Provider

  • Managed IT
    • Managed IT
    • Antivirus & Spam Filtering
    • Data Backup & Recovery
    • IT Help Desk
    • Maintenance & Support
    • Remote Monitoring & Management
  • Cybersecurity
    • Cybersecurity
    • Services & Solutions

      • AI Support Services
      • Attack Surface Management (ASM)
      • Cloud Security
      • Continuous Compliance Monitoring
      • Data Loss Prevention (DLP)
      • Email Security
      • Encryption
      • Endpoint Security
      • Identity & Access Management (IAM)
      • Managed Detection & Response (MDR)
      • Multi & Two-Factor Authentication
      • Network Security
      • Security Information & Event Management (SIEM)
      • Security Operations Center
      • Web Security
    • Audits & Testing

      • Cyber Security Risk Assessments
      • Cyber Threat Intelligence
      • Digital Forensics & Incident Response (DFIR)
      • Penetration Testing
      • Vulnerability Management
    • Compliance

      • CMMC Compliance
      • CMMC 2.0 Requirements
      • Certification Audit Support
      • FedRAMP
      • FISMA
      • NIST 800-171
      • Readiness Assessment
      • RPO Support
      • 3PAO Support
  • Infrastructure
    • Infrastructure
    • On-Premises

      • Network Administration
      • Security Camera Installation
      • Server Consolidation
      • Server Installation & Maintenance
      • Server Migration
      • Structured Cabling
    • Cloud-Based

      • Cloud Migration
      • Cloud Hosting
      • Colocation Data Center
      • Virtualization
    • Phone & Telecom

      • PBX Phone Systems
      • SIP Phone Systems
      • Unified Communications (UCaaS)
      • VoIP Phone Systems
  • AI
    • AI
    • Cybersecurity
    • Endpoint Security
    • Fraud Detection
    • IAM
    • Malware Detection and Response
    • Network Security
    • Risk Assessment
    • Security Customization
    • SIEM
    • Threat Detection and Response
    • Tools and Platforms
  • Consulting
    • Consulting
    • IT Staff Augmentation
    • GSA Capabilities & Schedule 70
    • Security Awareness Training
    • Technical Support
    • Virtual CIO
    • Virtual CISO
  • Products
    • Products
    • Computers
    • Networking
    • Security Cameras
    • Servers
    • Telecommunications
  • About
    • About
    • Areas Served
    • Blog
    • Careers
    • Case Studies
    • Contact
    • Events
    • Industries
    • News
    • Team
  • Portal
  • Pay Now
  • Request Consultation

Understanding Ransomware & Crypto Viruses

August 10, 2016 · Advantage Technology · Managed IT

At Advantage Technology we have several tools that can help you protect yourself from ransomware and crypto viruses.

On Tuesday, August 9, I was invited to appear on 580 WCHS’s Ask the Expert show to talk to their audience about ransomware and crypto viruses. I took the opportunity to inform the audience about the threat and to paint a realistic scenario of the real and present danger these viruses represent. Following that, we discussed some ways that businesses and organization can protect themselves and services provided by Advantage Technology that can prevent attacks or recover from attacks after they happen.

We started the show off talking about traffic being slow getting into the studio and giving some introductory information but quickly got into our discussion on ransomware. Right off the bat, I introduced several key statistics about ransomware:

  • Over 18 million dollars were paid to ransomware thieves between April 2014 and June 2015.
  • There were more than 6 million detected ransomware attack attempts in Q4 2015.
  • 50% of all malware are now ransomware attacks.

You can hear the entire show below or get it directly from SoundCloud.

The scenario I then present is one that happens every day, where you open your computer and see that all your important files, from Word Documents to PDFs to accounting databases, are gone and replaced with encrypted files. On your desktop is a txt file that informs you that your computer has been infected with a crypto virus, and all your files have been encrypted. The file has a series of steps you need to follow to pay a ransom via Bitcoin and then the attacker will restore your files.

We then discussed how this is becoming more and more common and that even the radio station has been a victim of this type of attack. I was quick to point out how easy it is to become a victim, explained that it is nothing to be embarrassed about and unpacked an actual event where it happened in a very understandable way.

How did we get here?

After painting this scenario, we went on to discuss how we’ve gotten to this point where viruses have become such a direct, extortion threat from international crime syndicates. The simple answer is the advent of cryptocurrencies, like Bitcoin. Because this type of attack is without question a crime, the criminals need a totally untraceable form of payment and cryptocurrencies are like digital cash. While cryptocurrencies are certainly used for many of legitimate uses, they have enabled on-line criminals to flourish with these type of extortion schemes.

How do you protect yourself?

At Advantage Technology we have several tools that can help you protect yourself, we discussed those next.

  • Dell SonicWALL – The SonicWALL is an appliance that is installed as the front-line of defense between your network and the Internet. It is a Unified Treat Prevention appliance that filters incoming and outgoing data, analyses it and stops known threats.
  • Anti-Virus – These are must have programs for end-user protection. If you are outside of the network or have files that are brought in from the outside, the computer is vulnerable. We have several anti-virus solutions we use and recommend based on individual circumstances.
  • Backups – While there are a lot of backup solutions available today, it is important for businesses and organizations to get a backup that is designed to adequately restore data in a timely manner. If a crypto virus infects your network, it could lock up terabytes of data. Our backup solutions are designed for large amounts of data and rapid recovery.
  • Advantage Remote Monitoring – This is a service that continually scans your servers and workstations to alert you to vulnerabilities and threats. It’s an affordable and easy way to manage and monitor your network to stop threats before they do too much damage.

At Advantage Technology, we also have experience in paying these ransoms and can help if you find yourself infected. Call us now if you have any immediate need at 866-497-8060 or request a consultation online.

Let's Talk About Your Ideas

Toll-Free: 866-497-8060
support@advantage.tech

Charleston, WV

950 Kanawha Blvd E. #100 / Charleston, WV 25301
V: 304-973-9537 | F: 304-720-1423

Bridgeport, WV

1509 Johnson Avenue / Bridgeport, WV 26330
V: 304-973-9550

Frederick, MD

8 East 2nd St. #201 / Frederick, MD 21701
V: 240-685-1255

"*" indicates required fields

Full Name*
This field is hidden when viewing the form
Send Now

Advantage Tech logo light

Since the early 2000's, Advantage Technology has been providing reliable managed IT services to organizations across a range of industry types. With multiple offices located in West Virginia and Maryland, we tailor our IT solutions to the unique needs and requirements of businesses throughout the Mid-Atlantic region.


Company

  • About
  • Areas Served
  • Blog
  • Careers
  • Case Studies
  • Contact
  • Events
  • Industries
  • News
  • Team
  • Request Consultation

Managed IT

  • Antivirus & Spam Filtering
  • Data Backup & Recovery
  • IT Help Desk
  • Maintenance & Support
  • Remote Monitoring & Management

Cybersecurity

  • Services & Solutions
  • Audits & Testing

IT Infrastructure

  • On-Premises
  • Cloud-Based
  • Phone & Telecom

IT Consulting

  • IT Staff Augmentation
  • GSA Capabilities & Schedule 70
  • Security Awareness Training
  • Technical Support
  • Virtual CIO
  • Virtual CISO

Link to company Facebook page

Link to company Instagram page

Link to company LinkedIn page

Link to company Twitter page

Link to company YouTube page

© Copyright 2025 | Powered by 321 Web Marketing

Popup Modal: Windows 10 EOL Announcement

Advantage Technology favicon

Windows 10 Support Is Ending

Microsoft will stop supporting Windows 10 soon, putting your systems at risk. Let Advantage Technology help you upgrade to a secure, efficient, and future-ready solution.

Learn More