Skip to main content
IT Services & Support

CompuWorks began in 1987 in Pittsfield, MA to help businesses understand how computer systems impacted their workflow. Today we address ever-changing technological challenges while creating a positive business impact. Learn more about our IT services.

Our Services
Industries We Serve

For every industry we work with, we help elevate that organization’s IT readiness. Our IT solutions can be tailored to meet your needs and address sector-specific challenges. Learn more about the industries we serve.

Industries We Serve
About CompuWorks

Since our humble beginnings, CompuWorks has grown into an award-winning Managed IT Services Provider, building a reputation of technical excellence. Learn more about the CompuWorks way of doing business.

About Us

Ransomware Glossary

Antivirus software

Antivirus software provides defense against known malware threats.  Often subscription-based, AV software is continuously updated as new threats become known.  Anti-virus products can also help with the removal of malware.

Bitcoin

Bitcoin is a type of cryptocurrency based on blockchain technology.  Ransom payments are almost always required to be made using Bitcoin.

Cyberattack

This is a general term describing malicious actions by individuals and groups attempting to gain unauthorized access to systems and data for profit, political or other gains.

Cybercriminal

An individual who commits cybercrimes or cyberattacks.

Cyber Hygiene

The methodologies and best practices used to maintain good cyber health and prevent the risk of a cyber incident.

Crypto Ransomware

The term “crypto” refers to the encryption of data and is also a reference to the Cryptolocker ransomware attack that occurred in 2013 and was one of the earlier examples of ransomware.

Cryptovirology

An area of study that looks at the utilization of encryption technology to develop malware.

Data Backup

A data backup is not simply a copy of your data.  Data backups are generally conducted periodically in increments and provide the ability to restore to a number of previous points in time.  A backup may provide for several intraday restore points, as well as daily, weekly, monthly, etc. for a period of time.

Decryption

The process of returning data to its original state, unencrypted.  In order to decrypt data, an encryption key is needed.  Without one decryption is impossible.

Encrypt

The process of turning readable data into unreadable code that can only be decrypted with an encryption key.

Locker Ransomware

A form of ransomware that locks files and prevents users from accessing them until a ransom is paid.

Malware

Malware is software specifically designed to harm, disrupt or gain unauthorized access to data or systems.

Offline Backups

Backups stored in a manner that is disconnected from the network.  An advantage to an offline backup is that it cannot be accessed remotely by bad actors.

Paysafecard

A service that allows payments without any bank account or credit card information being shared.

Phishing

Phishing is a type of e-mail based security threat used to attempt to gain unauthorized access to a system or data. Phishing e-mail messages are made to look real and seek to get the recipient to click on a link that can result in malware being downloaded onto the device. Phishing attempts are the most common entry point for malware which is why a strong security awareness education program should be an important part of an overall security program.

Ransomware

Phishing is a type of e-mail based security threat used to attempt to gain unauthorized access to a system or data. Phishing e-mail messages are made to look real and seek to get the recipient to click on a link that can result in malware being downloaded onto the device. Phishing attempts are the most common entry point for malware which is why a strong security awareness education program should be an important part of an overall security program.

Remote Desktop Protocol (RDP)

A Microsoft technology that allows users to control a remote Windows PC.

Trojan

Disguised as legitimate software, a Trojan is a type of malicious software used by cybercriminals to gain access to systems and data.  Social engineering and phishing attacks are common ways for users to be tricked into.

Worm

A worm is a type of malware that creates copies of itself to spread from device to device.  They often create chaos by overwhelming bandwidth and infecting host computers in such a way that they can become involved in botnet attacks which can create a denial of service attacks.

Protect Your Organization From Ransomware

IT Secuirty

IT Secuirty

We help you invest in new security technologies to protect your organization better, or we can help manage and monitor existing systems. Our extensive security expertise and knowledge of getting the most from the latest tools means we are well-positioned to support your needs.

Find security
Backup & Disaster Recovery

Backup & Disaster Recovery

When disaster strikes, we implement a backup and disaster recovery (BDR) solution that allows you to recover from system failures or a security breach rapidly. Our solution strengthens your business’ resilience through improved backup and data recovery planning.

Get confident

Download your FREE copy today!

It can be challenging to find the right IT Service Provider. If you’re new to the world of reliable, outsourced IT services, read through this eBook to learn about all the benefits your business can experience.