× Home Why Elliptic Testimonies Partners and Certifications Products Allworx Phone Systems Datto Dell Corporation Dell Hardware Solutions Dell PC Advisor Lenovo Lenovo Hardware Solutions Hewlett Packard Cisco VMware Solutions for your Business Free Stuff Free Data Assessment Free Network Assessment Support Center About Us Contact Us Careers Referrals Testimonies
☰ Navigate


Datto Partner Logo

Ransomware and You

Are you here because you are a victim of Ransomware? Or are you interested in being pro-active to protect your data from Ransomware?

We don't mean to scare you, but there is a monstrous threat devouring data across the nation!

Ransomeware Monster

Image provided by Datto

Ransomware Protection and Recovery Solution

Your data is more valuable to you than to anyone else. That is why hackers are after your data: so they can sell it back to you. They want to prevent you from doing business, in effect holding your business for ransom. All it takes is one click by one employee on an attachment in an email personalized for them, designed to look genuine. That one click begins the process of locking down the employee's files. In short order, they are prevented from doing their job. Then it silently spreads to other desktops and servers on the network. If left unchecked, it will shut down your business in hours. Your valuable data will be encrypted and marked for deletion unless the ransom is paid. Most attacks also include a countdown timer, with portions of your business data deleted permanently as the clock ticks down and no ransom is paid.

If this has happened to you, you are not alone. Ransomware attacks are succeeding on an unprecedented scale. With individual attacks netting anywhere from a few hundred to thousands of dollars, Ransomware netted over $325 million in 2015, and has already made over $200 million in the first half of 2016. In this environment, what can you do about it?

Prevention through Business Continuity

Datto is pleased to announce the industry's first Ransomware Protection and Recovery Solution (RPRS). Built on top of innovative new features in the Datto SIRIS, NAS, Backupify and Datto Drive product lines, this solution will detect a ransomware attack, and roll back systems to a point in time before the attack happened. This includes protecting files and folders anywhere on the network, on mobile devices, workstations, and in the cloud.

So please feel free to contact us here at Elliptic Systems so we can begin to help you develop a disaster backup and recovery solution that fits your business needs.

The Ransomware Family

There are a few dominant types, or families, of ransomware in existence. Each type has its own variants. It is expected that new families will continue to surface as time goes on. Historically, Microsoft Office, Adobe PDF and image files have been targeted, but McAfee predicts that additional types of files will become targets as ransomware continues to evolve.

Ransomware Family Provided by DATTO

Image provided by Datto

These nasty creatures make up the ransomware family. Ransomeware, the cash cow of today's hackers, has become an incredibly lucrative resource, netting cyber thieves millions of dollars a year. From CryptoLocker and Locky to CrptoWall and TeslaCrypt, it's all bad news for vulnerable end users and businesses. Get the facts straight and protect your data before it's too late.


The criminals behind CTB-Locker take a different approach to virus distribution. Taking a page from the playbooks of Girl Scout Cookies and Mary Kay Cosmetics, these hackers outsource the infection process to partners in exchange for a cut of the profits. This is a proven strategy for achieving large volumes of malware infections at a faster rate.


Ransomware has been around in some form or another for the past two decades, but it really came to prominence in 2013 with CryptoLocker. The original CryptoLocker botnet was shut down in May 2014, but not before the hackers behind it extorted nearly $3 million from victims. Since then, the CryptoLocker approach has been widely copied, although the variants in operation today are not directly linked to the original. The word CryptoLocker, much like Xerox and Kleenex in their respective worlds, has become almost synonymous with ransomware.


TorrentLocker is typically distributed through spam email campaigns and is geographically targeted, with email messages delivered to specific regions. TorrentLocker uses an AES algorithm to encrypt file types.


CryptoWall gained notoriety after the downfall of the original CryptoLocker. It first appeared in early 2014, and variants have appeared with a variety of names, including: Cryptorbit, CryptoDefense, CryptoWall 2.0 and CryptoWall 3.0, among others. Like CryptoLocker, CryptoWall is distributed via spam or exploit kits.

With all of this in mind, Elliptic Systems can provide your business with the most up to date disaster backup and recovery solution.

With Elliptic Systems You Will Receive: Backup of your data and IT infrastructure in our offsite data centers, assuring duplicate copies in case of disgruntled employees, hackers, fire, flood, or other catastrophic loss. Simple, secure access to your files through our dedicated servers. Automatic & consistent data backups of your important files.

So please feel free to contact us here at Elliptic Systems so we can begin to help you develop a disaster backup and recovery solution that fits your business needs.

Get Your Free Ransomware
Vulnerability Assessment!

If you are here because you have fallen victim to Ransomware or if you would like to have our assistence with a pro-active preventitive solution then, please fill out the form below and our highly skilled Technical Staff will contact you soon to schedule an appointment.


Replace the word submit with the digits from the above image.

Get an Unlimited Calling Plan Local & Long Distance $25.00/month! Includes Canada, Lower 48, Hawaii, Puerto Rico & Virgin Islands Contact us for details!

(425) 357-6222

Contact us today to learn more about how we can help your company save time, money, and resources on technology.


Click here to learn more about our commitment to our client's success.