Mon – Fri  9AM – 5PM|Client Portal
ITstuffed
Cybersecurity

Malware vs Ransomware: What Every Practice Manager Needs to Know

It is mid-morning and someone on your team opens what looks like a routine email attachment. Within minutes, files start disappearing or locking up across your network. You call your IT support contact, and they ask: is it ransomware, or something else? If you have no idea what that question means, you are not alone - but the answer changes everything about how you respond.

Malware is a broad term for any software designed to cause harm. It includes viruses that spread between computers, programs that quietly watch what your staff type, and software that runs in the background using your systems to attack others. The damage can be subtle. A practice running slowly, files going missing, or client data quietly leaking to someone outside your network. You might not know anything is wrong for weeks.

Ransomware is a specific type of malware with a very different goal. Instead of hiding, it announces itself. It locks your files - sometimes your entire network - and demands payment to restore access. Think of it as your data being held hostage. A 2024 report from Sophos found the average ransom demand had reached USD $2.73 million, up nearly a million dollars from the year before. That figure is for larger organisations, but small practices are increasingly targeted precisely because their defences tend to be lighter. And paying does not guarantee you get your data back.

The distinction matters for how you respond. Malware infections can sometimes be contained and cleaned if caught early. Ransomware requires a different playbook - isolating affected machines immediately, not paying the ransom, and restoring from a clean backup if one exists. If you do not have recent backups stored separately from your main network, ransomware can effectively erase months of work. For a healthcare practice or law firm holding sensitive client information, that is not just an operational crisis - it may also trigger notification obligations under the NZ Privacy Act 2020. Serious incidents should be reported to CERT NZ at cert.govt.nz.

Both types of threat typically get in the same way: a staff member clicks something they should not, software has not been updated, or a device without proper protection connects to the network. The encouraging news is that the defences overlap too. Keeping software current, filtering email attachments, using multi-factor authentication, and maintaining separate backups address both threats. The critical piece most small practices are missing is not awareness - it is having someone who actively manages these things so you do not have to think about them.

That is exactly what managed IT support is for. A good IT support arrangement means your systems are monitored, patched, and backed up before something goes wrong - not after. It also means if something does happen, there is someone who knows your setup and can act fast. For practices handling sensitive client data, that kind of proactive cover is not a luxury.

If you are not sure how well your practice is protected against either of these threats, ITstuffed offers a 15-minute IT Fit Check. Book one at /booking and find out where you actually stand.