Canadian Cyber Security Journal
SOCIAL:
Filed under: News

Ricoh Canada introduces RansomCare – a final line of defense against ransomware attacks Français

MISSISSAUGA, ON, Oct. 4, 2021 /CNW/ – Ricoh Canada Inc. today announced the launch of its new ransomware Containment Service that leverages RansomCare (RC) powered by Bullwall. Ransomware attacks are one of the top security threats to businesses in Canada and around the world through their increase in frequency and impact. RansomCare is a revolutionary final line of defense providing multi-layered security detection to identify, contain and isolate ransomware outbreaks at the entry point.

“With the proliferation of successful ransomware attacks in Canada it has become paramount that businesses of all sizes rethink their cybersecurity strategies and defenses. Ransomware attacks have become incredibly easy to execute and can cost corporations not only millions of dollars, but also damage to their reputation and brand.” said Scott Charlton, Director Innovation & Alliances Marketing, Ricoh Canada. RansomCare is a vital element to an in-depth defense security strategy and acts as a last line of defense to stop an attack in near real-time.”

With the capacity to infect up to 10,000 files per minute, per infected device, ransomware is a form of malicious software, or malware. It encrypts files and documents, holding computers and data files hostage, while drastically impacting downtime that can contribute to data loss and network downtime and bring businesses to a halt.

RansomCare ensures that business data is protected from cyberattacks with advanced, integrated tools for comprehensive data protection, including:

  • Active file monitoring to detect known and unknown ransomware variants and immediately alert security administrators of threats;
  • Quick response to infected devices to halt illegitimate encryption, preventing mass spread to files and reducing risk of expensive recovery efforts;
  • Informed recovery of impacted files, simplifying backup restoration and logging attack details for additional insight;
  • Detailed reporting and exported incident reporting for key stakeholders and data authorities.
Enjoy this article? Don’t forget to share.