{"id":105504,"date":"2020-08-25T17:28:08","date_gmt":"2020-08-26T00:28:08","guid":{"rendered":"\/blogs\/?p=105504"},"modified":"2025-08-12T02:06:54","modified_gmt":"2025-08-12T09:06:54","slug":"ransomware-data-breach-5-tips-to-stay-secure","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/","title":{"rendered":"Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure"},"content":{"rendered":"<p><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">C<\/span><\/span><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">ybercriminals<\/span><\/span><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">\u00a0tend to keep with the times, as they\u00a0<\/span><\/span><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">often<\/span><\/span><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">\u00a0<\/span><\/span><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">leverage current events a<\/span><\/span><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">s a way<\/span><\/span><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">\u00a0to harvest user data or spread malicious content.\u00a0<\/span><\/span><a class=\"Hyperlink SCXW51608435 BCX0\" href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-july-2020.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW51608435 BCX0\" data-ccp-charstyle=\"Hyperlink\">McAfee COVID-19 Threat Report July 2020<\/span><\/span><\/a><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">\u00a0points to a rather significant surge in attacks exploiting the\u00a0<\/span><\/span><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">current\u00a0<\/span><\/span><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">pandemic with COVID-19 themed malicious apps, phishing campaigns, malware, and ransomware.\u00a0<\/span><\/span><span class=\"TextRun SCXW51608435 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51608435 BCX0\">However, what many users don\u2019t realize is that ransomware attacks are a lot more than meets the eye.\u00a0<\/span><\/span><span class=\"EOP SCXW51608435 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2>COVID-19\u00a0Themed\u00a0Ransomware<\/h2>\n<p><span data-contrast=\"auto\">During the\u00a0<\/span><span data-contrast=\"auto\">first few months of\u00a0<\/span><span data-contrast=\"auto\">2020, the McAfee Advanced Threat Research (ATR) team\u00a0<\/span><span data-contrast=\"auto\">saw that <\/span><span data-contrast=\"auto\">cyber<\/span><span data-contrast=\"auto\">criminals <\/span><span data-contrast=\"auto\">were <\/span><span data-contrast=\"auto\">targeting <\/span><span data-contrast=\"auto\">manufacturing, law, and construction<\/span><span data-contrast=\"auto\">\u00a0businesses<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">After\u00a0<\/span><span data-contrast=\"auto\">pinpointing<\/span><span data-contrast=\"auto\">\u00a0their targets, h<\/span><span data-contrast=\"auto\">ackers spread\u00a0<\/span><span data-contrast=\"auto\">COVID-19 themed<\/span><span data-contrast=\"auto\">\u00a0ransomware campaigns to these<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">companies<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">in an effort t<\/span><span data-contrast=\"auto\">o<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">capitalize on their relevancy during this time<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">An example of one of these\u00a0<\/span><span data-contrast=\"auto\">attacks<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">in action is\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-july-2020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Ransomware-GVZ<\/span><\/a><span data-contrast=\"auto\">. Ransomware-GVZ displays a ransom note demanding payment in return for decrypting the firm&#8217;s compromised systems and the personal and corporate data they contain. The ransomware then encrypts the organization&#8217;s files and\u00a0<\/span><span data-contrast=\"auto\">displays<\/span><span data-contrast=\"auto\">\u00a0a lock screen if\u00a0<\/span><span data-contrast=\"auto\">a<\/span><span data-contrast=\"auto\">\u00a0user attempts to reboot their device. As a result, the company is left with a severely crippled network while the criminals behind the attack gain a treasure trove of data<\/span><span data-contrast=\"auto\">\u00a0\u2013\u00a0<\/span><span data-contrast=\"auto\">information\u00a0<\/span><span data-contrast=\"auto\">belonging to consumers that have previously interacted with the\u00a0<\/span><span data-contrast=\"auto\">business<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2>Ransomware Could Be the New Data Breach<\/h2>\n<p><span data-contrast=\"auto\">As ransomware attacks\u00a0<\/span><span data-contrast=\"auto\">continue to\u00a0<\/span><span data-contrast=\"auto\">evolve<\/span><span data-contrast=\"auto\">, it\u2019s not just file encryption that users need\u00a0<\/span><span data-contrast=\"auto\">to be aware of<\/span><span data-contrast=\"auto\">\u00a0\u2013 they also need to\u00a0<\/span><span data-contrast=\"auto\">be aware of<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">the impact the attack has on compromised\u00a0<\/span><span data-contrast=\"auto\">data. Senior Principal Engineer and Lead Scientist\u00a0<\/span><a href=\"https:\/\/www.businesswire.com\/news\/home\/20200721005195\/en\/McAfee-Report-Shows-Threat-Actor-Evolution-Pandemic\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Christiaan\u00a0<\/span><span data-contrast=\"none\">Beek<\/span><span data-contrast=\"none\">\u00a0stated<\/span><\/a><span data-contrast=\"auto\">, \u201c<\/span><span data-contrast=\"auto\">No longer can we call these attacks just ransomware incidents. When actors have access to the network and steal the data prior to encrypting it, threatening to leak if you don\u2019t pay, that is a data\u00a0<\/span><span data-contrast=\"auto\">[infraction]<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u201d\u00a0<\/span><span data-contrast=\"auto\">If a ransomware attack exploits an organization and their network is compromised, so is the data on that network. Hackers can\u00a0<\/span><span data-contrast=\"auto\">steal this data before encrypting it and\u00a0<\/span><span data-contrast=\"auto\">use this\u00a0<\/span><span data-contrast=\"auto\">stolen\u00a0<\/span><span data-contrast=\"auto\">information to conduct identity theft or\u00a0<\/span><span data-contrast=\"auto\">spread\u00a0<\/span><span data-contrast=\"auto\">other misfortune that can affect both the organization\u2019s employees and their customers.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This surge in ransomware is only compounded by traditional<\/span><span data-contrast=\"auto\">\u00a0data\u00a0<\/span><span data-contrast=\"auto\">infringements<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"none\">\u2013<\/span><span data-contrast=\"auto\">\u00a0which\u00a0<\/span><span data-contrast=\"auto\">have\u00a0<\/span><span data-contrast=\"auto\">also\u00a0<\/span><span data-contrast=\"auto\">spiked in conjunction with the global pandemic. According to the McAfee COVID-19 Threat Report July 2020,\u00a0<\/span><span data-contrast=\"auto\">the number of reported\u00a0<\/span><span data-contrast=\"auto\">incidents<\/span><span data-contrast=\"auto\">\u00a0targeting the public sector, individuals, education, and manufacturing dramatically increased<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">In fact, McAfee Labs counted 458 publicly disclosed security incidents\u00a0<\/span><span data-contrast=\"auto\">in the\u00a0<\/span><span data-contrast=\"auto\">few months of<\/span><span data-contrast=\"auto\">\u00a02020, with a 60% increase in attacks from Q4 2019 to Q1 2020<\/span><span data-contrast=\"auto\">\u00a0in the United States<\/span><span data-contrast=\"auto\">\u00a0alone<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Coincidentally, the<\/span><span data-contrast=\"auto\">\u00a0attacks targeting\u00a0<\/span><span data-contrast=\"auto\">organizations also impact the consumers who\u00a0<\/span><span data-contrast=\"auto\">buy from them, as the company\u2019s data consists of their customer\u2019s personal and financial information.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2>Don\u2019t Let Your Data Be Taken for Ransom<\/h2>\n<p><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">Because of the high volume\u00a0<\/span><\/span><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">of<\/span><\/span><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">\u00a0<\/span><\/span><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">data that\u2019s compromised<\/span><\/span><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">\u00a0by ransomware attacks, it\u2019s crucial for consumers to\u00a0<\/span><\/span><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">shift\u00a0<\/span><\/span><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">how they approach these threats and respond in a similar way that they would a data\u00a0<\/span><\/span><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">incident<\/span><\/span><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">.\u00a0<\/span><\/span><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">Luckily<\/span><\/span><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">, there are actionable steps you can take as a\u00a0<\/span><\/span><span class=\"TextRun SCXW143159553 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143159553 BCX0\">consumer to help secure your data.\u00a0<\/span><\/span><span class=\"EOP SCXW143159553 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3>Change your credentials<\/h3>\n<p><span class=\"TextRun SCXW26456946 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW26456946 BCX0\">If you discover that a\u00a0<\/span><\/span><span class=\"TextRun SCXW26456946 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW26456946 BCX0\">data leak<\/span><\/span><span class=\"TextRun SCXW26456946 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW26456946 BCX0\">\u00a0or a ransomware attack has compromised a company you<\/span><\/span><span class=\"TextRun SCXW26456946 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW26456946 BCX0\">\u2019ve interacted with<\/span><\/span><span class=\"TextRun SCXW26456946 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW26456946 BCX0\">, err on the side of caution and change your passwords for\u00a0<\/span><span class=\"NormalTextRun AdvancedProofingIssueV2 SCXW26456946 BCX0\">all of<\/span><span class=\"NormalTextRun SCXW26456946 BCX0\">\u00a0your accounts. Taking extra precautions can help you avoid future attacks.<\/span><\/span><span class=\"EOP SCXW26456946 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3>Take password protection seriously<\/h3>\n<p><span class=\"TextRun SCXW165529006 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW165529006 BCX0\">When updating your credentials, you should always ensure that your passwor<\/span><\/span><span class=\"TextRun SCXW165529006 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW165529006 BCX0\">d is strong and unique. Many users utilize the same password or variations of it across all their accounts. Therefore, be sure to diversify your passcodes to ensure hackers cannot obtain access to\u202fall\u202fyour accounts at once, should one password be compromis<\/span><\/span><span class=\"TextRun SCXW165529006 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW165529006 BCX0\">ed. You can also employ a\u202f<\/span><\/span><a class=\"Hyperlink SCXW165529006 BCX0\" href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW165529006 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW165529006 BCX0\" data-ccp-charstyle=\"Hyperlink\">password manager<\/span><\/span><\/a><span class=\"TextRun SCXW165529006 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW165529006 BCX0\">\u202fto keep track of your credentials.<\/span><\/span><span class=\"EOP SCXW165529006 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3>Enable two-factor or multi-factor authentication<\/h3>\n<p><span class=\"TextRun SCXW15724478 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW15724478 BCX0\">Two or multi-factor authent<\/span><\/span><span class=\"TextRun SCXW15724478 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW15724478 BCX0\">ication provides an extra layer of security, as it requires multiple forms of verification. This reduces the risk of successful impersonation by hackers.<\/span><\/span><span class=\"EOP SCXW15724478 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3>If you are targeted, never pay the ransom<\/h3>\n<p><span class=\"TextRun SCXW66568216 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW66568216 BCX0\">It\u2019s possible that you could be targeted individually\u00a0<\/span><\/span><span class=\"TextRun SCXW66568216 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW66568216 BCX0\">by a ransomware campaign. If this happens, don\u2019t pay the ransom.\u00a0<\/span><\/span><span class=\"TextRun SCXW66568216 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW66568216 BCX0\">Although you may feel that this is the only way to get your encrypted files back, there is no guarantee that the\u202fransomware\u202fdevelopers will send a decryption tool\u00a0<\/span><\/span><span class=\"TextRun SCXW66568216 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW66568216 BCX0\">once they receive the paymen<\/span><\/span><span class=\"TextRun SCXW66568216 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW66568216 BCX0\">t. Paying the ransom also contributes to the development of more\u202fransomware\u202ffamilies, so it\u2019s best to hold off on making any payments.<\/span><\/span><span class=\"EOP SCXW66568216 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3>Use a comprehensive security solution<\/h3>\n<p><span data-contrast=\"auto\">Adding an extra layer of security with a solution such as <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">McAfee\u00ae Total Protection<\/span><\/a><span data-contrast=\"auto\">, which includes\u00a0<\/span><span data-contrast=\"auto\">Ransom Guard<\/span><span data-contrast=\"auto\">, can help protect your devices from these cyberthreats.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2>Stay Updated<\/h2>\n<p><span data-contrast=\"auto\">To stay updated on all things <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">McAfee<\/span><\/a> <span data-contrast=\"auto\">and for more resources on staying secure from home, follow <\/span><a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">@McAfee_Home\u202f<\/span><\/a> <span data-contrast=\"auto\">on Twitter, listen to our podcast <\/span><a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\" target=\"_blank\" rel=\"noopener noreferrer\"><i><span data-contrast=\"none\">Hackable?<\/span><\/i><\/a><span data-contrast=\"auto\">,\u202f and \u2018Like\u2019 us on\u202f<\/span> <a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Facebook.<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals\u00a0tend to keep with the times, as they\u00a0often\u00a0leverage current events as a way\u00a0to harvest user data or spread malicious content.\u00a0McAfee&#8230;<\/p>\n","protected":false},"author":674,"featured_media":126674,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,13],"tags":[4452,4145,32,4140,4549],"coauthors":[3973],"class_list":["post-105504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-privacy-identity-protection","tag-cybersecurity","tag-data-breach","tag-data-protection","tag-quarterly-threats-report","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Could Be the New Data Breach:\u00a05 Tips to Stay Secure\u00a0<\/title>\n<meta name=\"description\" content=\"In 2020, attacks are surging that exploit the current pandemic with COVID-19 themed malicious apps, phishing campaigns, malware, and ransomware. We explore how ransomware impacts data security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Could Be the New Data Breach:\u00a05 Tips to Stay Secure\u00a0\" \/>\n<meta property=\"og:description\" content=\"In 2020, attacks are surging that exploit the current pandemic with COVID-19 themed malicious apps, phishing campaigns, malware, and ransomware. We explore how ransomware impacts data security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-26T00:28:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T09:06:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_NewDataBreach.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure\",\"datePublished\":\"2020-08-26T00:28:08+00:00\",\"dateModified\":\"2025-08-12T09:06:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/\"},\"wordCount\":828,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_NewDataBreach.jpg\",\"keywords\":[\"cybersecurity\",\"Data Breach\",\"data protection\",\"Quarterly Threats Report\",\"ransomware\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/\",\"name\":\"Ransomware Could Be the New Data Breach:\u00a05 Tips to Stay Secure\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_NewDataBreach.jpg\",\"datePublished\":\"2020-08-26T00:28:08+00:00\",\"dateModified\":\"2025-08-12T09:06:54+00:00\",\"description\":\"In 2020, attacks are surging that exploit the current pandemic with COVID-19 themed malicious apps, phishing campaigns, malware, and ransomware. We explore how ransomware impacts data security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_NewDataBreach.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_NewDataBreach.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Could Be the New Data Breach:\u00a05 Tips to Stay Secure\u00a0","description":"In 2020, attacks are surging that exploit the current pandemic with COVID-19 themed malicious apps, phishing campaigns, malware, and ransomware. We explore how ransomware impacts data security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Ransomware Could Be the New Data Breach:\u00a05 Tips to Stay Secure\u00a0","og_description":"In 2020, attacks are surging that exploit the current pandemic with COVID-19 themed malicious apps, phishing campaigns, malware, and ransomware. We explore how ransomware impacts data security.","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-08-26T00:28:08+00:00","article_modified_time":"2025-08-12T09:06:54+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_NewDataBreach.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure","datePublished":"2020-08-26T00:28:08+00:00","dateModified":"2025-08-12T09:06:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/"},"wordCount":828,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_NewDataBreach.jpg","keywords":["cybersecurity","Data Breach","data protection","Quarterly Threats Report","ransomware"],"articleSection":["How To Guides and Tutorials","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/","name":"Ransomware Could Be the New Data Breach:\u00a05 Tips to Stay Secure\u00a0","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_NewDataBreach.jpg","datePublished":"2020-08-26T00:28:08+00:00","dateModified":"2025-08-12T09:06:54+00:00","description":"In 2020, attacks are surging that exploit the current pandemic with COVID-19 themed malicious apps, phishing campaigns, malware, and ransomware. We explore how ransomware impacts data security.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_NewDataBreach.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_NewDataBreach.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/ransomware-data-breach-5-tips-to-stay-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/105504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=105504"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/105504\/revisions"}],"predecessor-version":[{"id":218477,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/105504\/revisions\/218477"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/126674"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=105504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=105504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=105504"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=105504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}