outsmart the attacker
The new epidemic: small business ransomware
Ransomware is running rampant as global attacks grew by 600 percent in 2016, more than $1 billion in ransom payments and untold billions in extended damage.1
With a harmless click on a link or email, ransomware quickly installs on a victim’s device, essentially holding it and its data for hostage. To get your data back? Prepare to pay the ransom – unless you have an automated data loss protection solution that allows you to independently recover your files, negating the need to pay.
Two in five small businesses have already been hit with ransomware.2 When ransomware hits, the average small business experiences two full days of downtime.3 One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify.4 To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back.5 But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Small businesses face more attacks and more devastating consequences
As big-name corporate data breaches and high-profile enterprise hacks make daily headlines, the same sophisticated attacks are increasingly hitting smaller targets: small to medium-sized businesses that often lack the automatic backup strategy their larger peers employ.
Cyberattacks increasingly target small businesses. 41% of small businesses say cyberattacks are their biggest business threat and for good reason.6
Nearly half (43%) of all cyberattacks now target organizations with 250 employees or fewer.6 And reports suggest there’s a one-in-two chance your small business will be hit with some form of cyberattack in the next 12 months.7 It’s a big threat—with dire consequences. The average attack costs a small business more than $20,000.8 Buried by these costs, 60 percent of small businesses shut down permanently within a year of an attack.9
Data loss protection starts with a solution that is automatic, reliable, secure and doesn’t rely on your employees to take action. This includes automated continuous protection of files, off-site protection in the cloud, and end-to-end encryption.
Outdated small business data loss protection strategies and technologies are not equipped to protect growing organizations. Cybercriminals know smaller organizations have fewer resources to dedicate to data security, making them an easier target.
4 steps to cyberattack recovery
- Protect every computer – every computer matters. Around 60 percent of all small business data lives on desktops and laptops.10 If you want to ensure every file is covered, then you need a solution that automatically protects data directly from every laptop and desktop
- Tap the benefits of cloud backup. The cloud enables leading data loss protection providers to offer truly unlimited protection, meaning you can protect every file—so you’re always ready for fast recovery of any information.
- Ensure you have automatic data loss protection. Your disaster recovery plan should start with something that’s automatic and continuous. Automatic data loss protection gives you certainty that every version of every file is always backed up and recoverable—without frustrating your employees and impeding productivity.
- Prioritize faster recovery. You should be able to recover files to any device—laptops, desktops and tablets; Mac, Windows or Android—and you should be able to do it from home or on the road, without needing a VPN connection.
Compromising just one user often grants the “keys to the castle.” Put another way, just one simple click on an infected email or malicious link and the entire company is in trouble.
Losing critical data such as customer information, financial account information or intellectual property—or even temporarily losing access to that data—leads to devastating costs.
Make recovery quick and easy with CrashPlan for Small Business
- Every file guaranteed: automatic, continuous data loss protection.
- Turn back the clock: Point-in-time restores.
- Do it yourself: Simple self-restore capabilities.
- Anytime, anywhere: cloud-based remote restore capabilities.
- Built for speed: global deduplication at the source to speed restores up to nine times over.
Protect all of your data and guarantee a fast and complete recovery. See how automatic data loss protection guarantees data protection, enables fast recovery and gives you a powerful small business cybersecurity tool.
2 Ponemon Institute: The Rise of Ransomware