By Nico Gazzano - Chief Information Officer
Unless you’ve lived under a rock for the past 4 years, you’ve undoubtedly heard about ransomware. Names like Cryptolocker, Locky, CryptXXX and KeRanger make up a handful of the many iterations of malicious software that have the ability to restrict access to the infected computer system by encrypting any and all files that it is able to get a hold of.