What is ransomware?
Ransomware is malicious software that can be installed on your computer or mobile device – without your knowledge – for the purpose of extortion. This type of software has the power to block access to your files and, if it spreads through the computer network, can even paralyze your business completely. In some cases, hackers may demand a ransom by threatening to release sensitive information. These attacks can also target critical infrastructure on a larger scale.
How does ransomware work?
As soon as this malware enters your computer system, it begins to analyze and encrypt your data, making it inaccessible. This process is rapid – it can affect thousands of files in just a few minutes.
Once the encryption is complete, a message will appear on your screen demanding a ransom in exchange for a decryption key, i.e., a password that enables you to regain access to your files. Hackers usually demand payment in cryptocurrency, such as Bitcoin, and may demand a higher amount if funds aren’t transferred in time.

Good to know: Even if you pay the ransom, hackers may never send you the decryption key needed to recover your data. That’s why it’s so important to focus on prevention and protect your business’s IT network against these extortion methods.
How do ransomware attacks occur?
Hackers will use a variety of strategies to infiltrate your computer or mobile device with their malware.
- Phishing emails are one of the most common methods: simply open an attachment or click on a link and the ransomware downloads automatically.
- Fraudulent websites and applications from unverified sources can also be potential sources of transmission.
How can I identify a phishing email?
There are a few clues that can help you identify a message containing malicious software:
- Check the email address: if it doesn’t match that of the company or person sending you the message, you should be wary.
- Move your cursor over links to reveal URLs: if they differ from the company’s official domain name, don’t click.
- If you have any doubts, don’t open attachments: this is often how malware, including ransomware, is installed.
→ Learn how to recognize fraudulent communications
How can you protect yourself against ransomware?
Even if you take the precautions mentioned above when reading an email, visiting a website or downloading an application, you’re not completely safe from a ransomware attack. The best defence is to protect yourself before the fact:
- Raise your employees’ awareness by training them to recognize phishing attempts and other cyber threats. Test their reflexes by regularly sending them emails illustrating social engineering tactics.
- Regularly update your operating systems and software to eliminate security vulnerabilities.
- Set up a foolproof backup plan so you can restore your data without having to pay a ransom in the event of a ransomware attack. The 3-2-1 rule means keeping three copies of your data (the original files, a local backup and a remote backup) on two types of media (e.g., a hard disk and a cloud), one of which should be off-site.
- Opt for robust security solutions to detect and block ransomware. For example, install antivirus software on all your devices, including those for personal use.
- Limit your employees’ access rights to minimize the impact of a ransomware infection. For example, a computer’s “administrator” profile, which is authorized to change device settings and install software, should only be used when absolutely necessary.
→ Learn how to protect your business from attacks
What should you do if you’re the victim of a ransomware attack?
If malware manages to infiltrate your business’s IT network, stay calm and follow these steps:
- Call in IT security specialists to provide assistance and take the necessary steps to prevent another cyberattack.
- Report the incident to the Canadian Anti-Fraud Centre (external link) and file a complaint.
- Follow all the recommendations from the Canadian Cyber Security Centre (external link).
To avoid being put in this unfortunate situation, don’t wait to secure your business’s IT network, especially if you handle sensitive information.

Further reading
Strengthen your company’s
cybersecurity by consulting these additional articles:
→
How can you prevent impersonation fraud?
→
How to protect your email inbox from fraud
→
How to create a secure password
Discover more tips and tools to protect your business on our fraud prevention page.