Get Aligned!

We’re continuing to see a resurgence in the business affecting virus called CryptoLocker, also known as CryptoWall.

The Crypto virus is propagated via email primarily as either a PDF or excel document, but we have also seen infections caused by stealth downloads from internet browsing. The virus encrypts all documents on the network rendering them useless. It then displays a ransom note with reference to CryptoLocker or CryptoWall.

This is by far one of the worst viruses we have seen and due to it mutating with new strains, it’s becoming increasingly difficult to prevent, or at times, even detect.

User vigilance is therefore crucial. If you suspect that you have been infected, please contact our Service Desk immediately.

Crypto Virus – What are we doing about it?

We’re actively monitoring the security policies in our datacentres and on our client sites, alongside ensuring that anti-virus updates are successfully managed and monitored to the best of our ability. We’re also working closely with our security vendors to ensure that we stay up-to-date with the latest security releases and forum discussions.

In January 2016, we will be launching an enhanced network & internet security service to our user community, which will help further reduce the increasing level of cyber-threat.

We encourage you to update all your employees regarding the additional vigilance that’s needed.

If you have any questions about the Crypto virus, please do not hesitate to contact our support team at support@oryxalign.com or call +44 20 7605 7890.

Back to List

Related Stories

Technology is redesigning the workplace

Technology is redesigning the workplace

We are entering a new era of IT. One that fundamentally reimagines where we work, the way we work, and how we provide the tools for work. Th…

Read Post

Three Key Components of a Cyber Resiliency Framework

Three Key Components of a Cyber Resiliency Framewo…

Extortionists know that the availability of backups often determines whether they can collect on their ransom demands. Those without suffici…

Read Post

Moving Beyond the Perimeter

Moving Beyond the Perimeter

In this white paper, you’ll find – An overview of the new enterprise architecture, Detailed descriptions of new risks, How to protect agai…

Read Post

The headlines are clear - cyber attacks are imminent

The headlines are clear – cyber attacks are immine…

The UK’s National Cyber Security Centre (NCSC), the FBI, and the US Department of Homeland Security have issued a joint alert warning of a g…

Read Post

Paradigm Shifts - What to expect in 2018

Paradigm Shifts – What to expect in 2018

Skills and resources – these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security…

Read Post

The new breed of ransomware that's changing all the rules

The new breed of ransomware that’s changing all th…

The recent spread of WannaCry and NotPetya are rewriting the rules of ransomware, and it’s turning into something far more sinister. If thes…

Read Post

Ransomware: How you can help prevent an infection

Ransomware: How you can help prevent an infection

Ransomware: the word on everyone’s lips right now. If you haven’t been hit, you no doubt will be on-edge until the perceived threat disappea…

Read Post

London Property Forecast 2017

London Property Forecast 2017

While London has weathered an uncertain economy surprisingly well and looks set to remain stable in the upcoming year, occupancy rates are e…

Read Post

Ransomware Defence for Dummies

Ransomware Defence for Dummies

The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative criminal enterprise…

Read Post

GDPR: 12 Steps to Take Now

GDPR: 12 Steps to Take Now

GDPR is only one year away, and the clock is ticking to make sure your business is compliant. While there are many similarities between the …

Read Post