Ransomware, if you have been hit with it, you know already the amount of damage it can have on your entire network or computer.

What Ransomware does, holds your PC for ransom.

Basically, it encrypts all your files so that you cannot open them without a decryption key. Usually, the computer will modify the background of your computer and display a popup demanding money to be transferred to get the encryption key, they can be aggressive in nature demanding if you do not pay the price will go up and if you fail that they will destroy the decryption keys. Ransomware is known as a denial-of-access attack.

How does it get on your computer?

Anyone around the world right now maybe clicking on a link in a spam email or opening a document activating macros which is going to infect your computer.

Characteristics

  • It can encrypt all types of files
  • It can encrypt all types of filesIt scrambles the names so you have no idea what you have lost
  • It scrambles the names so you have no idea what you have lostAdds new extensions to files so you cannot open them
  • Adds new extensions to files so you cannot open themIt requests payment in bitcoins (method that is extremely hard to trace converting your money into currency that the criminals can use)
  • It requests payment in bitcoins (method that is extremely hard to trace converting your money into currency that the criminals can use)The ransom has a time limit
  • The ransom has a time limitOften recruits infected PC into botnets so it can be used to enhance the criminals attacks
  • Often recruits infected PC into botnets so it can be used to enhance the criminals attacksCan spread across the network to PC’s and servers
  • Can spread across the network to PC’s and serversIt is known to extract data, i.e. usernames, passwords, email addresses etc.
  • It is known to extract data, i.e. usernames, passwords, email addresses etc.Includes geographical targeting meaning ransom not is in victims language
  • Includes geographical targeting meaning ransom is in victims language
  • Ransomware Creators and Distributors target mostly

Ransomware Creators and Distributors target mostly

  • Police Departments
  • City Councils
  • Schools
  • Hospitals
  • Home users

Ransomware targets home users a lot due to the low level of awareness and security.  And another main reason for this is that their computers unknowingly can be recruited into the Botnets to distribute and widen the attacks from the criminals.  Another being the large volume of internet users and more money is generated in trying to get back the family photos and files.How to protect yourself

How to protect yourself

  1. Don’t just store data on your local PC have it backed up to other external devices
  2. Don’t just store data on your local PC have it backed up to other external devicesHave 2 backups, external
  3. Have 2 backups, external drive, and cloudKeep your operating system updated, security updates and other application patches
  4. Keep your operating system updated, security updates and other application patchesUse limited privileged account on your
  5. Use limited privileged account on your computer, not an administrator account minimises what can happenTurn off macros etc. in your office application not always possible as sometimes your company may need to use them
  6. Turn off macros etc. in your office application not always possible as sometimes your company may need to use themMinimise the plugins used in your browser, set it to prompt to activate when required
  7. Minimise the plugins used in your browser, set it to prompt to activate when requiredEnsure your browser is using increased security and privacy settings
  8. Ensure your browser is using increased security and privacy settingsUse an ad blocker to prevent the popups in your browser
  9. Use an ad blocker to prevent the popups in your browserNever open spam emails
  10. Never open spam emailsNever click or download attachments from spam or suspicious emails
  11. Never click or download attachments from spam or suspicious emailsNever click links in spam or suspicious emails
  12. Never click links in spam or suspicious emailsUse a paid Antivirus product that includes automatic updating and real-time scanning (Free AV software does not suffice)The only true way to really protect yourself is to ensure you have backups of your data that are not connected to your computer for extended periods of time.
  13. Use a paid Antivirus product that includes automatic updating and real-time scanning (Free AV software does not suffice)

The only true way to really protect yourself is to ensure you have backups of your data, and the media where backups are stored is not connected to your computer for extended periods of time.

The only true way to really protect yourself is to ensure you have backups of your data that are not connected to your computer for extended periods of time.

If you would like to discuss this with us and see how you rate in protecting your system please call us or email us directly so we can set up a complimentary consultation.

Email: shaun@its2.com.au

Call 1300 554 237

0 comments

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Get in touch with us

Find out more about IT system Solutions and how we can help you.

Contact Us