Model

Corporations and Host providers spend millions of dollars on building firewalls and data encryption to protect the data that are trusted with. In many cases breaking through firewalls or trying to guess the encryption keys are very difficult if not impossible. Hackers have much better luck preying on human weakness using deception and sometimes collaboration to gain access. Hackers often use multi-tiered attacks. The first layer is often a phishinglayer to get the user to deploy a virus (Trojan horse)and/or get his credentials. This is followed by data extraction, or in the case of Ransomware simply data encryption, with the hope that the user will pay a ransom to get their data back un-encrypted.