Ransomware Successfully Deployed.

Beginning file encryption…

Or at least, it could have been.

Your or your organisation’s files could have been maliciously encrypted.

You could have been coerced into paying a ransom through untraceable means, such as bitcoin or other cryptocurrencies.

There’s no guarantee that your files would’ve actually been decrypted after paying.

This could have been a countdown to when the ransom price increases.

This time, it was a test – but it won’t always be.

We’ve designed some great resources as part of the Information Security Wiki which are designed to empower you to make the right choices when it comes to suspicious emails, texts, calls, etc.

CONTACT US

If you have any questions, queries, or data security concerns you would like to raise with us, you can find us on Google Chat or over email at [email protected].
Remember, all questions are valid questions.