Ransomware

BeckyStrause

What is Ransomware? Ransomware is a general term for the currently fastest growing type of computer virus.  Ransomware is a type of malicious software designed to block access to a computer system or the files on it until a sum of money is paid. Ransoms vary from around $300 to over $1500.  Some recent variants have […] The post Ransomware appeared first on Eberly Systems.

What is Ransomware?

Ransomware is a general term for the currently fastest growing type of computer virus.  Ransomware is a type of malicious software designed to block access to a computer system or the files on it until a sum of money is paid. Ransoms vary from around $300 to over $1500.  Some recent variants have been called Locky, TorrentLocker, and CryptoLocker .
According to a CSO online article published on Jun 1 st, 2016, ransomware now accounts for as much as 93% of phishing emails up from 56% in December 2015.  Most of the time, infections arrive as an attached Zip or Microsoft Office Document

What can you do?
The first, and most important, line of defense is to be careful.  You should NEVER open an email attachment you receive if it’s unexpected or from an unknown or questionable source. The most common attachment types used for distributing malware are zip files, and office documents with macros. This makes things especially difficult as attachments are the lifeblood of many organizations.  Here are a few tips to help you identify if an attachment is safe.

  • Be suspicious of all attachments, especially zip files. Do not open anything if you don’t know the sender or weren’t expecting it.
  • If it purports to contain privileged or sensitive information, there is a very high likelihood its dangerous.
  • If you open a Microsoft office document and it asks you to enable macros close the file immediately and call the sender to confirm that the document is legitimate and find out why it has Macros.  Macros are very powerful, and should never be trusted if it came through email even if you know the sender!

Your only defense against losing all of your files is to preemptively backup, backup and backup your data .  Having an up to date backup is the only thing that can save you if you get hit by ransomware.  If you’re not sure if you have a good enough backup follow the 3-2-1 rule. You should have 3 copies of your data, on 2 different types of media (ie, hard drive, flash storage, or cloud etc.) and 1 copy somewhere geographically different. Because backups are the only recourse you have once infected ransomware developers are specifically targeting any backups you may have that are accessible from your local computer to delete or otherwise lock you out of. Once your files have been encrypted your only options are to pay the ransom and hope you get your files back, or to restore from backup.
While the prospect of losing all of your data can be concerning, if you have a good backup, you don’t need to panic. Contact Eberly Systems if you have any questions, want to make sure you’re backing up your data, or think you may be a victim to ransomware.  We’re always here to help!

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers