What Is Ransomware? A Canadian Business Guide

Ransomware is malware that encrypts your files and demands payment (typically in cryptocurrency) for the decryption key. Modern ransomware attacks — called "double extortion" — also exfiltrate your data before encrypting it, threatening to publish sensitive information publicly if the ransom isn't paid. The Canadian Centre for Cyber Security (CCCS) reports that Canadian businesses face 40% higher ransomware targeting rates than US counterparts, and 60% of Canadian SMBs that experience a ransomware attack close within 6 months.

How ransomware attacks work (2026)

  1. Initial access — most commonly via phishing email (malicious attachment or link), Remote Desktop Protocol (RDP) exposed to the internet, VPN credentials purchased on the dark web, or exploitation of unpatched software vulnerabilities
  2. Persistence and lateral movement — attackers install backdoors, steal credentials, and move laterally across the network over days or weeks before triggering encryption
  3. Data exfiltration — in double-extortion attacks, attackers exfiltrate sensitive files to their servers before encrypting; this gives them leverage even if you have good backups
  4. Encryption — ransomware encrypts files across all reachable drives, network shares, and cloud-synced folders (OneDrive, SharePoint), rendering them inaccessible
  5. Ransom demand — ransom notes demand payment (typically $50,000-$5,000,000 CAD depending on business size) within 72-96 hours before the price increases or data is published

Why backups alone don't protect against ransomware

Many businesses believe backups are sufficient ransomware protection. Modern ransomware counters this assumption:

How ransomware is different from other malware

7 controls that protect Canadian businesses from ransomware

  1. MFA on all accounts — especially email and remote access; prevents credential-based initial access
  2. EDR on all endpoints — behavioural detection catches ransomware before encryption completes
  3. Email security filtering — anti-phishing, anti-malware, and safe links scanning blocks most initial access vectors
  4. Immutable backups with tested restoration — 3-2-1-1 backup with offline or immutable copy; monthly restoration tests
  5. Patch management — critical patches applied within 72 hours; no internet-exposed unpatched services
  6. Network segmentation — limits lateral movement; attackers who compromise one system cannot reach everything
  7. Security awareness training — employees who recognize phishing attacks prevent most initial access attempts

Related glossary terms

How Outsource IT Canada can help

Ready to transform your IT? Call (416) 623-9677 for a free assessment.