Ransomware: self-check for SMEs and the self-employed

Ransomware: self-check for SMEs and the self-employed

Share post

Large companies can use penetration tests to check how secure their IT security structure is. Now every SME or self-employed person can run a system test with ransomware on Ransom-Check: free of charge, without registration.

Every day, companies, authorities, municipal utilities and even hospitals have to shut down their operations because the IT is no longer usable. So-called ransomware has struck. From now on, a simple and free self-test for the greatest dangers is possible for everyone.

Self-test with ransomware

🔎 On Ransom-Check, laypersons can also simulate a ransomware attack on their systems (Image: Ransom-Check).

Cyber ​​criminals want to extort ransom money. To do this, they must penetrate the IT environment. They are often unknowingly helped by employees. For example, the “wrong” attachment is clicked once. A single click from an employee is all it takes. The malware (ransomware) can then be started. As a result, attackers can access, copy and/or encrypt data. From now on everyone can check the vulnerability of their surroundings.

The new free portal was presented at it-sa 365 – the online format of the leading trade fair for cyber security – and in the innovation forum at eltefa – the trade fair for electronics, energy, buildings and industry.

Ransom-Check provides test package

On the side RansomCheck a simple test package can be downloaded. With the tests, many common access routes of cyber gangsters can be checked without risk. The test can also be carried out by laypersons. A simple and concrete checklist for self-assessment is provided for this purpose. In this way, IT laypersons can quickly check for themselves whether their organization is susceptible to common cyber blackmail attacks.

More at Ransom-Check.de

 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more