Facing a cryptor infestation in the corporate network is a pure nightmare for IT staff and the entire company. A slippery piece of software may encrypt all of the data on the firm's computers into an unreadable form and the data can only be decrypted by using the necessary decryption key – owned by the criminal who wants money for it, and sometimes very serious money.