We no longer support this browser. Using a supported browser will provide a better experience.

Please update your browser.

Close browser message

Treasury and Payments

Improve your working capital, reduce fraud and minimize the impact of unexpected disruptions with our treasury solutions—from digital portals to integrated payables and receivables—all designed to make your operations smoother and more efficient.

Learn more about our treasury solutions:

Credit and Financing

Prepare for future growth with customized loan services, succession planning and capital for business equipment or technology.

Learn more about our credit and financing solutions:

Commercial Real Estate

Get the strategic support to be successful throughout market and real estate cycles with insights, hands-on service, comprehensive financial solutions and unrivaled certainty of execution.

Learn more about our commercial real estate solutions:

International Banking

Global opportunities mean global challenges. But real success means understanding the local markets you serve—which is why we bring the business solutions, insights and market perspective you need. 

Learn more about our international banking solutions:

Cybersecurity and Fraud Protection

How to Prevent a Ransomware Attack

Two global ransomware attacks this year illustrated the importance of protecting your organization before important data is compromised. Learn the steps to take to help avoid the operational and financial consequences of an attack.

The executive was a bit sheepish when she approached Mike Kelly, Commercial Banking’s Business Information Security Officer, after a meeting with clients about cybersecurity awareness. Her company had been targeted by cyber criminals in a ransomware scheme, and she wanted to know how to avoid another attack.


“For most clients, it begins with basic hygiene for their systems,” Kelly said. “Keep your infrastructure and software up to date, and educate employees to recognize questionable emails. If you take care of the basics, you make it much harder for criminals who use ransomware to succeed.”

Ransomware Today

Two global ransomware attacks in 2017—known as WannaCry and Petya—targeted firms using Windows XP or other outdated software that was vulnerable to attack. In many cases, firms had received a software patch in March, but had not applied it by the attacks in May and June. Other attacks have focused on firms that do not require multifactor authentication to access email or on “phishing” schemes where employees open malware attachments that give criminals access to systems and act as administrators. After the systems are compromised, criminals hold files hostage until companies pay a ransom—typically in cryptocurrency—before providing an encryption key that returns the files.

JPMorgan Chase & Co. advises clients who are victims of a ransomware attack to contact the FBI as soon as possible. In 2016, the FBI’s Internet Crime Complaint Center received 2,673 complaints identified as ransomware, with losses totaling more than $2.4 million. Law enforcement agencies acknowledge that some companies pay the demands out of convenience, but also note that companies that agree to pay often set themselves up for another attack.

Experts say criminals are increasing ransomware attacks on companies that hold large amounts of personal data, including hospitals, government agencies and financial institutions.

Steps to Help Protect Your Business

Education and prevention are the best protection, particularly when criminals “spray” malicious emails throughout a network knowing some employees will open them and inadvertently give criminals access to important files and systems.

“Most ransomware targets Windows users and all files on a system you would deem important,” said JF Legault, the firm’s Global Head of Cybersecurity Operations. “The way to protect those files is the same, whether it’s a big firm or a small one: Don’t click on suspicious links. Don’t open an attachment if you don’t know who it came from. Don’t open an Office document if it asks you to enable macros. Take the time to verify requests in person or by using a known telephone number. Don’t fall for the line, ‘This is urgent and needs to be done now.’”

Beyond education, it’s important to incorporate these threats into a firm’s broader business resiliency plan. “Companies should always have robust systems and procedures in place to back up files,” Legault said. “That way, in the event someone does click on a link and installs ransomware, the company will have the ability to restore files from backup and not be forced to pay the ransom.”

Don’t click on suspicious links. Don’t open an attachment if you don’t know who it came from. Don’t open an Office document if it asks you to enable macros. Take the time to verify requests in person or by using a known telephone number. Don’t fall for the line, ‘This is urgent and needs to be done now.’

- JF Legault, Global Head of Cybersecurity Operations, JPMorgan Chase & Co.

Often, smaller companies that cannot afford to hire full-time technology resources must rely on consultants to evaluate their vulnerabilities and help correct them by implementing software patches.


“Protection doesn’t always have to be expensive—it’s often just a question of attention to detail. Many smaller companies held hostage by ransomware don’t regularly update and patch their computers and devices,” said Anish Bhimani, Commercial Banking’s Chief Information Officer. “The likelihood of being successfully targeted is much lower for companies that routinely maintain their systems and keep security software up to date.”

As part of the firm’s cybersecurity strategy, layers of applications protect against ransomware attacks, software patches are applied promptly and multiple storage backup systems are used. The firm color-codes external emails to help employees identify possible phishing attempts, requires employees to create unique passwords and change them regularly, and uses multifactor authentication to access email from outside the firm’s firewalls.

“Every company or organization—big or small—needs to be aware that criminals are out there monitoring,” said Rohan Amin, the firm’s Global Chief Information Security Officer. “Software is developed by human beings. It will always be flawed, and we will always have criminals looking for vulnerabilities and ways to monetize them.”

Get in Touch and Stay Informed