Stop Hackers Before They Can Even Throw Their First Punch
![]() |
Zero day attacks are malware or virus’ that exploit security vulnerabilities in a computer application or program, generally before developers of that software are aware of the weakness. |
![]() |
A particularly nasty form of malware known as cryptolocker is reigning havoc among many Australian organisations. Infected machines encrypt files so that they can only be accessed with a particular key that only the hackers know. Organisations are then held to ransom for access to this key, with ransoms starting at 500 USD. Some sites have reported that infection has resulted in a systematic deletion of backups as well as the encryption of network drives. The ransom was then inflated to over $10,000. Not only can the monetary cost of cryptolocker attacks be high, but it also causes massive disruption to business productivity. |
![]() |
Standard anti-virus software identifies infection risks by searching definitions of known security threats. As a zero-day attack preys on unknownvulnerabilities; with no definitions available, it is unlikely that your anti-virus would identify and quarantine these kinds of malware, leaving you at risk of infection. |
![]() |
Unlike many other protection products, Sophos Intercept X doesn’t rely solely on known definitions in order to identify threats. Instead it uses behaviour based screening which watches for techniques that malware use as part of their attacks, detecting malicious behaviour and stopping it in its tracks. This product also features CryptoGuard, which prevents the malicious spontaneous encryption of data by ransomware—even trusted files or processes that have been hijacked. |
Recommended Posts