Imagine this. You turn on your computer and instead of the familiar screen you see: “Attempting to Boot from Hard Drive (C:). To decrypt contact email@example.com.” Uh-oh. You get that feeling in the pit of your stomach. This is not good. Or imagine you open your e-mail and there is a five-figure demand from a cyber-criminal threatening to publish your client’s private documents stolen from your computer. Then there is the more common problem: a computer crash destroys your files and data.
Premium Content For:
- Solo, Small Firm and General Practice Division