{"id":25084,"date":"2022-02-02T15:04:21","date_gmt":"2022-02-02T15:04:21","guid":{"rendered":"https:\/\/1-grid.com\/knowledge\/web-security-what-is-ransomware\/"},"modified":"2026-01-26T07:56:29","modified_gmt":"2026-01-26T07:56:29","slug":"web-security-what-is-ransomware","status":"publish","type":"ht_kb","link":"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/","title":{"rendered":"Web Security: What is ransomware?"},"content":{"rendered":"<p><span lang=\"EN-US\" data-contrast=\"auto\"><strong><span style=\"font-family: Helvetica,sans-serif;\"><img decoding=\"async\" class=\"fr-fic fr-dib fr-bordered fr-shadow aligncenter\" style=\"width: 524px;\" src=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33040963329\/original\/AnOPFOFhu1WmCmw4C1xnWjAqvyC97-jHHQ.png?1590049110\" data-attachment=\"[object Object]\" data-id=\"33040963329\" \/><\/span><\/strong><\/span><\/p>\n<h2><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\"><strong>What is ransomware?<\/strong><\/span><strong>\u00a0<\/strong><\/span><\/h2>\n<p><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\">Ransom malware, or\u202fransomware, is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. Today, ransomware authors order that payment be sent via cryptocurrency or credit card.<\/span>\u00a0<\/span><\/p>\n<h2><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\"><strong>How do I get ransomware?<\/strong><\/span><strong>\u00a0<\/strong><\/span><\/h2>\n<p><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\">There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or\u202f<\/span><span lang=\"EN-US\" data-contrast=\"auto\">malspam<\/span><span lang=\"EN-US\" data-contrast=\"auto\">, which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites.<\/span>\u00a0<\/span><\/p>\n<p><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\">Malspam<\/span><span lang=\"EN-US\" data-contrast=\"auto\">\u00a0uses\u202fsocial engineering\u202fin order to trick people into opening attachments or clicking on links by appearing as legitimate\u2014whether that\u2019s by seeming to be from a trusted institution or a friend.<\/span>\u00a0<\/span><\/p>\n<h2><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\"><strong>What to do if\u00a0<\/strong><\/span><strong><span lang=\"EN-US\" data-contrast=\"auto\">I get\u00a0<\/span><span lang=\"EN-US\" data-contrast=\"auto\">infected<\/span>\u00a0<\/strong><\/span><\/h2>\n<p><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\">Ask the advice of a security\/IT specialist before trying anything.\u00a0<\/span>\u00a0<\/span><\/p>\n<p><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\">Do not try using a\u00a0<\/span><span lang=\"EN-US\" data-contrast=\"auto\">decryptor<\/span><span lang=\"EN-US\" data-contrast=\"auto\">\u00a0to unlock your files<\/span><span lang=\"EN-US\" data-contrast=\"auto\">. Not all ransomware families have had\u00a0<\/span><span lang=\"EN-US\" data-contrast=\"auto\">decryptors<\/span><span lang=\"EN-US\" data-contrast=\"auto\">\u00a0created for them, in many cases because the ransomware is utilizing advanced and sophisticated encryption algorithms. And even if there is a\u00a0<\/span><span lang=\"EN-US\" data-contrast=\"auto\">decryptor<\/span><span lang=\"EN-US\" data-contrast=\"auto\">, it\u2019s not always clear if it\u2019s for right version of the malware. You don\u2019t want to further encrypt your files by using the wrong decryption script.<\/span>\u00a0<\/span><\/p>\n<h2><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\"><strong>How do I protect myself from ransomware<\/strong><\/span><strong><span lang=\"EN-US\" data-contrast=\"auto\">?<\/span>\u00a0<\/strong><\/span><\/h2>\n<h3><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\"><strong>Invest in cybersecurity<\/strong><\/span><strong>\u00a0<\/strong><\/span><\/h3>\n<p><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\">A program with real-time protection that\u2019s designed to thwart advanced malware attacks such as ransomware.<\/span>\u00a0<\/span><\/p>\n<h3><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\"><strong>Backups<\/strong><\/span><\/span><\/h3>\n<p><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\">Y<\/span><span lang=\"EN-US\" data-contrast=\"auto\">ou need to create secure backups of your data on a regular basis. External hard drives could be used where you can save new or updated files\u2014just be sure to physically disconnect the devices from your computer after backing up, otherwise they can become infected with ransomware, too.<\/span>\u00a0<\/span><\/p>\n<h3><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\"><strong>Update your systems and software<\/strong><\/span><\/span><\/h3>\n<p><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\">There are constant updates being released for operating systems. When this update is released, notes are made available to the public advising what the patch was for and in some cases there are security patches released. If your systems are not updated, they will remain vulnerable to attacks.<\/span>\u00a0<\/span><\/p>\n<h3><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\"><strong>Be aware<\/strong><\/span><\/span><\/h3>\n<p><span style=\"font-family: Helvetica, sans-serif; color: #000000;\"><span lang=\"EN-US\" data-contrast=\"auto\">One of the most common ways that computers are infected with ransomware is through\u202fsocial engineering. Educate yourself (and your employees\u202fif you\u2019re a business owner) on how to detect\u00a0<\/span><span lang=\"EN-US\" data-contrast=\"auto\">malspam<\/span><span lang=\"EN-US\" data-contrast=\"auto\">, suspicious websites, and other scams. And above all else, exercise common sense. If it seems suspect, it probably is.<\/span>\u00a0<\/span><\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is ransomware?\u00a0 Ransom malware, or\u202fransomware, is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail&#8230;.<\/p>\n","protected":false},"author":21,"comment_status":"open","ping_status":"open","template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"ht-kb-category":[1190],"ht-kb-tag":[1307,455,547,1304,1305,891,951,1306,1105,1118],"class_list":["post-25084","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-web-security","ht_kb_tag-broke","ht_kb_tag-hacked","ht_kb_tag-is","ht_kb_tag-ransom","ht_kb_tag-ransomware","ht_kb_tag-security","ht_kb_tag-ssl-certificates-and-website-security","ht_kb_tag-stole","ht_kb_tag-web","ht_kb_tag-what"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is ransomware and how to protect your business<\/title>\n<meta name=\"description\" content=\"Ransom malware, or\u202fransomware, is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is ransomware and how to protect your business\" \/>\n<meta property=\"og:description\" content=\"Ransom malware, or\u202fransomware, is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access\" \/>\n<meta property=\"og:url\" content=\"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"1-grid Knowledge Base\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/1grid.co.za\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-26T07:56:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33040963329\/original\/AnOPFOFhu1WmCmw4C1xnWjAqvyC97-jHHQ.png?1590049110\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@1grid_hosting\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/\",\"name\":\"What is ransomware and how to protect your business\",\"isPartOf\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#website\"},\"datePublished\":\"2022-02-02T15:04:21+00:00\",\"dateModified\":\"2026-01-26T07:56:29+00:00\",\"description\":\"Ransom malware, or\u202fransomware, is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access\",\"breadcrumb\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/1grid.co.za\/knowledge\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web Security: What is ransomware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#website\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/\",\"name\":\"1-Grid Domain Hosting Knowledge Base\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/1grid.co.za\/knowledge\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#organization\",\"name\":\"1-Grid Domain Hosting Knowledge Base\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg\",\"contentUrl\":\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg\",\"width\":100,\"height\":100,\"caption\":\"1-Grid Domain Hosting Knowledge Base\"},\"image\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/1grid.co.za\/\",\"https:\/\/twitter.com\/1grid_hosting\",\"https:\/\/www.instagram.com\/1grid_hosting\/\",\"https:\/\/za.linkedin.com\/company\/1-grid\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is ransomware and how to protect your business","description":"Ransom malware, or\u202fransomware, is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"What is ransomware and how to protect your business","og_description":"Ransom malware, or\u202fransomware, is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access","og_url":"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/","og_site_name":"1-grid Knowledge Base","article_publisher":"https:\/\/www.facebook.com\/1grid.co.za\/","article_modified_time":"2026-01-26T07:56:29+00:00","og_image":[{"url":"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33040963329\/original\/AnOPFOFhu1WmCmw4C1xnWjAqvyC97-jHHQ.png?1590049110"}],"twitter_card":"summary_large_image","twitter_site":"@1grid_hosting","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/","url":"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/","name":"What is ransomware and how to protect your business","isPartOf":{"@id":"https:\/\/1grid.co.za\/knowledge\/#website"},"datePublished":"2022-02-02T15:04:21+00:00","dateModified":"2026-01-26T07:56:29+00:00","description":"Ransom malware, or\u202fransomware, is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access","breadcrumb":{"@id":"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/1grid.co.za\/knowledge\/web-security-what-is-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/1grid.co.za\/knowledge\/"},{"@type":"ListItem","position":2,"name":"Web Security: What is ransomware?"}]},{"@type":"WebSite","@id":"https:\/\/1grid.co.za\/knowledge\/#website","url":"https:\/\/1grid.co.za\/knowledge\/","name":"1-Grid Domain Hosting Knowledge Base","description":"","publisher":{"@id":"https:\/\/1grid.co.za\/knowledge\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/1grid.co.za\/knowledge\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/1grid.co.za\/knowledge\/#organization","name":"1-Grid Domain Hosting Knowledge Base","url":"https:\/\/1grid.co.za\/knowledge\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/","url":"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg","contentUrl":"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg","width":100,"height":100,"caption":"1-Grid Domain Hosting Knowledge Base"},"image":{"@id":"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/1grid.co.za\/","https:\/\/twitter.com\/1grid_hosting","https:\/\/www.instagram.com\/1grid_hosting\/","https:\/\/za.linkedin.com\/company\/1-grid"]}]}},"_links":{"self":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/25084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/comments?post=25084"}],"version-history":[{"count":6,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/25084\/revisions"}],"predecessor-version":[{"id":34162,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/25084\/revisions\/34162"}],"wp:attachment":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/media?parent=25084"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb-category?post=25084"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb-tag?post=25084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}