Whether you choose to sell cloud solutions to your customers or not is up to you but know this: Your customers want cloud solutions and they’ll find a way to acquire them — with or without you. The problem with the latter option is in addition to any potential revenue loss, you may inadvertently be helping them to play into the hands of CryptoWall 2.0, a special kind of ransomware virus that’s capable of executing 64-bit code, according to Cisco’s latest research.
So, how are your customer’s do-it-yourself (DIY) cloud solutions playing into CryptoWall’s clutches? Achmad Chadran, senior product marketing manager at Intronis shares a good example in his latest column, CryptoWall 2.0, Cloud Backup and the Do-It-Yourself Customer. Here’s a brief summary of the story he relates from one of Intronis’ channel partners:
Six employees within the company were sharing a freemium consumer cloud account where they regularly collaborated on spreadsheets and stored marketing materials and other important company documents. Each employee had full read-write privileges.
One of the employees opened an email attachment claiming to be a UPS delivery notification regarding something he ordered online. Unfortunately, the attachment contained an executable file that launched the CryptoWall 2.0 virus. In addition to encrypting every important file on the employee’s laptop, it encrypted his shared cloud folder, including all 200-plus files used by him and the other employees.
Making matters worse, the consumer cloud application detected the file changes and updated them to the cloud, which in turn updated all the computers linked to the shared cloud account.
How confident are you that your customers won’t be victimized by a similar ransomware virus that requires them to pay up or lose their data forever? VARs and MSPs that sell BDR and true business cloud solutions don’t have as much to fear, but those choosing to leave things to chance could easily be in for a rude awakening in 2015.