We tend to harp on about cybersecurity, but in certain industries (like medical and healthcare), it’s paramount. Cybercriminals target sensitive information because of its value, but also because of the crucial need for organisations to keep systems operational and data secure.
When the word ‘ransom’ is front-and-centre in an email, text message or notification, the situation is not likely going to be a fun one. That’s why we wanted to share what we know about ransomware in cybersecurity, and try to help prevent these types of situations from arising.
So…What Actually is Ransomware?
In the context of cybersecurity, ransomware is a malicious software that cybercriminals used to prevent organisations from accessing certain data, unless a ransom is paid or condition is met.
It’s common and can cause lengthy periods of downtime; not to mention financial and reputational damage to individuals and organisations. From federal government advice on ransomware, to managed IT service providers (like Xenex Systems) that can assist with prevention and everything in between – there are a lot of resources out there to help you.
Are There Different Types of Ransomware?
If you want the TL;DR… yes – there are different types of ransomware.
If you’re here for something a little more in-depth, we’ve got you covered too. The different types are essentially based on the action that they are trying to encourage you to take. Read on to learn a bit more about cryptoware and lockers, which are two of the more common types of ransomware.
Cryptoware
No, not related to cryptocurrency. In this type of malware attack, sensitive data and / or files become encrypted (or hidden) with code. Cybercriminals would then usually request payment of a ransom in return for a key that would unlock the information. For ransomware attacks that occur in industries like healthcare, or even financial services and public institutions, cryptoware is a common type of attack because of its ability to block access to sensitive data.
Lockers
Locker ransomware doesn’t use encryption. Instead, it’s designed to stop you from using your device by making it appear to be locked, or changing login details so that the device is basically rendered unusable. In cases where cybercriminals are using lockers, you might expect to see a message requesting a ransom payment in exchange for regaining access to the device.

Whether cybercriminals are using cryptoware lockers, or something different like leakware (threatening to leak sensitive information if a ransom isn’t paid), it’s important to remember, there is never a guarantee that the payment of a ransom will fix the situation if it ever arises.
3 Ways to Help Prevent Ransomware Attacks
There are a few things you can look out for when it comes to the prevention of ransomware. These are not hard-and-fast rules, or guaranteed to prevent ransomware, but bringing yourself up to speed on these things can help keep security top-of-mind.
#1 Phishing Emails
Up first, phishing emails. You might get these to any work-related or personal email addresses. They’re usually made to look like they’re from a reputable company, or even government-issued, however clicking on malicious links and engaging with content from phishing emails can cause ransomware. It’s best to simply report and delete these emails if you suspect foul play.
#2 Illegitimate Software
Next in the firing line – illegitimate software. Sometimes, a software update or application can look official and instead be a disguise to get you to download it. This is also referred to as a Trojan. Keep your eye out for any red flags when you’re installing new applications or updating current ones — suspicious links and unexpected or unknown sources are a good indicator that something might not be legitimate.
#3 Links or Files on Dodgy Websites
Finally, keep your eye out for links or files on dodgy-looking websites. It’s always good practice to check URLs, as well as look out for poor design and double-check spelling and grammar. A ridiculous amount of pop-ups and display ads can also be a sign that things aren’t right on a website. If you’re not sure, you can also look for things like privacy policies, terms and conditions and contact information to try and confirm the legitimacy of a website.
While this is just a quick and simple overview of ransomware in cybersecurity, knowing these things is a great starting point. Protecting yourself or your business against ransomware can be integrated into your managed IT approach through layered security, system maintenance and effective incident response.
Get in touch with the team at Xenex Systems for a free IT audit, and to chat more about your cybersecurity needs.