Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Computer virus robs north-east firm of £1,000 a minute

Post Thumbnail

Businesses in the north and north-east are being targeted by a computer virus which could rob them of up to £1,000 a minute.

Firms across the UK are being warned to be extra vigilant following reports that a cyber attack is set to strike in the next week.

Up to a million computers around the globe have already been hit by the new virus, which is causing catastrophic network collapse, disabling computer systems and allowing hackers to steal confidential data by following people’s keystrokes on a computer.

Most attacks are the result of clicking on an infected e-mail attachment, or visiting a hacked website.

Victims’ computers are effectively held hostage until a ransom fee is paid and are given a time-limit to have their information released before it is lost forever.

Last night, Aberdeen IT and software firm Indigo Technologies said it has already saved three local companies from the damaging ransomware virus, and has been dealing with inquiries about a new attack.

One client lost £15,000 in just 15 minutes – a rate of £1,000 a minute.

Indigo director, Sean Thomson, warned that it is essential for businesses to be prepared for the next strain of the virus, or they could face weeks of downtime and thousands of pounds in potential lost business revenue – and even the permanent closure of the business.

He said: “If your business relies heavily on IT services, it’s vital that systems run smoothly without downtime and protected from threats such as ransomware.

“In the latest attack, people are being tricked into opening an e-mail from the HMRC, and their computer keystrokes are being monitored.In a recent attack, one company had £15,000 stolen from its bank account within 15 minutes.”

Virtualisation software can restore and back-up the companies systems.

Virtualisation refers to the creation of a virtual machine that acts like a real machine allowing secure access to and delivery of applications and desktops.It provides complete data protection and automated disaster recovery which is vital if under attack from ransomware.

Mr Thomson added: “Paying a ransom doesn’t necessarily solve the problem, and companies who have paid the ransom have found that the decryption can take days and there is absolutely no guarantee that the ransomware won’t lie dormant on the recovered system.

“There is no magic cure after a system is corrupted – companies need to protect themselves from this threat.”