Get Aligned!

We’re continuing to see a resurgence in the business affecting virus called CryptoLocker, also known as CryptoWall.

The Crypto virus is propagated via email primarily as either a PDF or excel document, but we have also seen infections caused by stealth downloads from internet browsing. The virus encrypts all documents on the network rendering them useless. It then displays a ransom note with reference to CryptoLocker or CryptoWall.

This is by far one of the worst viruses we have seen and due to it mutating with new strains, it’s becoming increasingly difficult to prevent, or at times, even detect.

User vigilance is therefore crucial. If you suspect that you have been infected, please contact our Service Desk immediately.

Crypto Virus – What are we doing about it?

We’re actively monitoring the security policies in our datacentres and on our client sites, alongside ensuring that anti-virus updates are successfully managed and monitored to the best of our ability. We’re also working closely with our security vendors to ensure that we stay up-to-date with the latest security releases and forum discussions.

In January 2016, we will be launching an enhanced network & internet security service to our user community, which will help further reduce the increasing level of cyber-threat.

We encourage you to update all your employees regarding the additional vigilance that’s needed.

If you have any questions about the Crypto virus, please do not hesitate to contact our support team at support@oryxalign.com or call +44 20 7605 7890.

Back to List

Related Stories

Security on the move

Security on the move

The ability to stay secure and productive anywhere, on any device is of great and growing importance to all businesses.

We look at the fi…

Read Post

Business Benefits of Microsoft Azure

Business Benefits of Microsoft Azure

Connecting Clouds: The growing pains of cloud adoption continue as organisations realise that a single solution of either Private Cloud, Dat…

Read Post

Understand & improve your security posture

Understand & improve your security posture

Gain deeper visibility into and take control of your security.

Assessing your security posture is an ongoing challenge. Increasingly soph…

Read Post

Artificial Intelligence

Artificial Intelligence

Artificial Intelligence (AI) and Machine Learning (ML) are fast becoming important pillars of many organisations’ digital transformation s…

Read Post

IT Risk Management

IT Risk Management

With today’s pressures of compliance, cybercrime and customer demands organisations can no longer afford to have ad-hoc IT Policies and IT…

Read Post

Team Talk

Team Talk

Whether you use Office 365 or not; Microsoft Teams is free. That’s right, free. As in £0. Microsoft Teams is a hub for teamwork. Keep all…

Read Post

Office 365 Powers Ahead

Office 365 Powers Ahead

Microsoft release a quarterly report each month and within the latest quarter (April, Q3 2019) of the Earnings Call section it’s more good…

Read Post

Protecting Your .UK Presence

Protecting Your .UK Presence

The clock is ticking on who can register a .UK domain in your name.

Nominet, the governing body of UK domain names, released shorter .UK …

Read Post

Checklist to Digital Transformation

Checklist to Digital Transformation

Digital Transformation is the novel use of digital technology to solve traditional problems.

It’s about finding new ways to deliver valu…

Read Post

AWS, Azure & Google: A Public Cloud Comparison Report

AWS, Azure & Google: A Public Cloud Comparison Rep…

The three leading cloud computing vendors, AWS, Microsoft Azure and Google Cloud, each have their own strengths and weaknesses that make the…

Read Post