fbpx

How do I protect myself from Ransomware?

Preventing Ransomware

(Tips/Insights)

There’s a real possibility that your computer can get infected with ransomware. Ransomware is the most frequently used form of malware today. You’ve probably heard about it in the news. But, do you know how to protect yourself from ransomware? We’ll tell you here. 

How Do I Protect Myself From Ransomware? 

You must take ransomware seriously, and educate yourself about all the ways your computers could get infected, and the steps you should take to prevent it from landing on your computers in the first place.  You can do this with security tools provided by your IT company and by practicing safe internet browsing and email use.

What Happens If I Get Ransomware?

Ransomware denies you access to your computer system or data until you pay a ransom. You can get ransomware from phishing emails or by going to an infected website. When you get ransomware, malicious software will lock down your computer’s files unless you agree to pay around $300 in bitcoin.

If your network and computers get infected with ransomware, recovery can be difficult. It typically requires the services of a data recovery specialist to remove the ransomware virus. Ransomware attacks can be devastating to both individuals and companies. 

How Can Ransomware Get Into My Computer?

If you visit an infected website, you could unknowingly download a ransomware virus to your computer.  Or a phishing email might trick you into clicking on a malicious link or attachment that downloads a ransomware virus into your computer.

Phishing emails are designed to appear as though they’ve been sent from a person you know. They will try to entice you into clicking on a link or opening an attachment containing malicious code. After the code is run, your computer is infected with malware.

Are There Different Kinds Of Ransomware? 

There’s more than one kind of ransomware. Viruses like CryptoLocker, CryptoWall, Locky, WannaCry, Petya, NotPetya, Crypto, Bad Rabbit, Eternal Blue, and more are designed to deny access to your data or network until you pay a ransom.

The WannaCry and Petya ransomware viruses spread via a vulnerability in Microsoft’s Server Message Block (SMB) network file-sharing protocol that’s widely used. It helps your computers connect to other computers and devices like printers.

Ransomware falls into three categories: Encrypting Ransomware, Scareware, and Screen Lockers.

  1. Encrypting Ransomware

This is a virus that locks down your files by encrypting them. There’s no software available that can unlock your files when this happens. The criminals who send the encrypting ransomware will demand a ransom to decrypt your files. Even if you pay the ransom, you still might not get your files back.

  1. Scareware

Scareware uses rogue security software and tech support scams to entice you. When this happens, you’ll get a pop-up message on your computer claiming that it’s infected with malware. But you should ignore this because your files are just fine. However, if you do ignore it, you’ll continue to get this pop-up message.

  1. Screen Lockers

If you get this type of ransomware, you’ll be locked out of your computer. You’ll see a message posing as the FBI or Department of Justice saying that you must pay a fine because illegal activity was detected on your computer. Don’t pay this “fine.” The FBI or DOJ would never freeze your computer or demand payment. So, don’t take the bait.

Can Ransomware Infect My Mobile Devices? 

It wasn’t until 2014 and the height of the infamous CryptoLocker that ransomware started showing up on mobile devices. Mobile ransomware typically displays a message saying your device has been locked because of illegal activity, and you must pay a fee to unlock your device.

You can get mobile ransomware when you download malicious applications. To remove it you should start your mobile device in safe mode. Then you must find the malicious app and delete it.

How Can I Protect Myself From Ransomware?   

The best way to protect your computers from ransomware is to prevent it from landing on them in the first place. Here are some ways that you can protect yourself from getting ransomware:

  • Update your software and operating systems with the latest patches. Outdated applications and systems are the targets of most attacks.
  • Install and maintain anti-virus software, firewalls, and email filters to reduce some of this traffic. Configure your firewall to block access to known malicious IP addresses.
  • Be suspicious of unsolicited email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
  • Don’t provide personal information or information about your organization unless you are confident of a person’s authority to have the information.
  • Never click on links or open attachments in unsolicited emails. Exercise caution when opening email attachments. Be particularly wary of compressed or ZIP file attachments.
  • Follow safe practices when browsing the Internet. Be careful when clicking directly on links in emails, even if the sender appears to be known; attempt to verify web addresses independently (e.g., contact your organization’s helpdesk or search the Internet for the main website of the organization or topic mentioned in the email).
  • Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net). Look for https in the URL which indicates the site is secure.
  • Perform frequent backups of system and important files and verify those backups regularly. If ransomware affects your computer, you can restore your system to its previous state with any files unaffected by ransomware. And store backups on a separate device that can’t be accessed from a network or offline in a secure cloud solution.
  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Don’t use the contact information provided on a website or email connected to the request; instead, check previous statements for contact information. Information about known phishing attacks is also available online from anti-phishing groups.
  • If other people or employees use your network, restrict their permissions to install and run software applications. Apply the principle of “least privilege” to all systems and services. Restricting these privileges may prevent malware from running or limit its capability to spread through a network.
  • Use application whitelisting to allow only approved programs to run on your network.
  • Enable strong spam filters to prevent phishing emails from reaching you and authenticate inbound emails to prevent email spoofing.
  • Scan all incoming and outgoing emails to detect threats and filter executable files from reaching your computer.

How Can A Firewall Block Ransomware? 

Today’s modern firewalls are built to defend against ransomware. The right firewall and Intrusion Prevention System (IPS) helps to prevent viruses from getting into your computers.

Your IT company should implement a next-generation firewall with an Intrusion Prevention Systems (IPS). These can keep ransomware threats from getting into your network, and stop them from self-propagating and infecting other computers and systems.

An IPS collects the malicious traffic coming into your network and only lets the clean traffic through. It also performs what’s called deep packet inspection of your network traffic to detect exploits and stop them before they reach any of your computers. The IPS monitors for and identifies suspicious activity, logs the data, attempts to block it, and reports it to your IT services company.

This right IPS uses a tactic called sandboxing. It puts malicious programs in a separate place, so they can’t spread throughout your network. Ransomware like WannaCry and Petya spread like worms; they can lurk in files like Microsoft Office documents, a pdf, or updates for applications. Hackers can make these files appear valid and hide the malware. This is why sandboxing is essential for any IPS.

Ask your IT Services Company to:

  • Use a modern, high-performing next-generation firewall, IPS, and sandboxing solutions.
  • Perform network assessments to detect all security gaps in your network.
  • Set up a Virtual Private Network (VPN) to detect any IT assets that are vulnerable.
  • Establish IPS policies to prevent malware from spreading to other LANs.
  • Ensure that any infected network is automatically isolated until they can eradicate the infection.
  • Segment LANs, using VLANs (Virtual Local Area Networks) and connect them all to your next-generation firewall.

Using VLANs allows your computer to communicate through a virtual environment to protect them from any ransomware or other viruses that may be circulating in your network. Extending VLANs or zones into your firewall takes security to the next level.

Why Do We Need A Business Continuity Solution? 

Why Do We Need A Business Continuity Solution? 

With A Backup & Disaster Recovery Plan, Your Business Will Have The Business Continuity You Need 

The Top 10 Benefits

Depending on the location of your business, your operations may be vulnerable to storms that down trees and power lines. And, no matter where you are, a simple accidental deletion of data by one of your employees can put your business services on hold. Plus, don’t forget about the continually increasing cyber attacks that hold business data for a ransom. For all these reasons and more, you need a Business Continuity Solution.

What Is A Business Continuity Solution?

Some IT support companies call this a Business Continuity Plan, and some call it a Backup & Disaster Recovery Plan. But no matter what you call it, it will keep your data safe and accessible if you experience a man-made or natural disaster.

It provides you with a robust set of tools to give your business the best chance to stay open and recover quickly, and with as little damage as possible to your operations and reputation.

Your IT services company will map out a plan and devise strategies to ensure your business continuity. Your Plan will:

  • Protect your IT System from significant disruptions.
  • Get your business back up and running in the event of a disaster.
  • Test your backups and recovery regularly as part of routine site maintenance.
  • Perform backups hourly to a secure remote data center without human intervention–with logging and alerting that notifies about not just failures but on the absence of success–a fundamental distinction.
  • Recover files and complete systems for time periods going back days, weeks and months.
  • Take backup one step further; your IT service company will show you how to leverage the full power of the Cloud so your staff can continue working from anywhere they can access the Internet.

Other options to consider in your Business Continuity Solution include:

  • A Voice Over Internet Protocol (VOIP) telephone system to communicate when phone lines are down.
  • An Electronic Data Interchange (EDI) to transmit data including orders and payments from one company to another.
  • Approved laptops and wireless devices to create, process, manage and communicate information electronically.

What Are The Benefits Of Having A Business Continuity Solution? 

These are the Top 10 benefits:

  1. Your information technology will be protected, and your staff will be prepared and productive in the event of a disaster. Employees will be informed and rehearsed, and they’ll know what actions to take. This could save your business a lot of downtime and money.
  1. It will protect the image, brand, and reputation of your business. If you’re able to continue functioning despite a disaster, your patrons will see you as dependable, and your reputation will be enhanced as a result.
  1. Your customers will feel confident doing business with you; you’ll be able to keep your commitments and ensure the continuing quality of the hospitality services you deliver.
  1. It shows your investors that you take your business seriously; that you’re prepared and ready to maintain productivity.
  1. Your insurance company could view your business more favorably knowing that you’ve done everything you can do to protect it from a disaster.
  1. Your staff will gain an awareness of business operations that they didn’t have before. Business Continuity Planning can often provide your personnel with useful insights into improving the way they handle tasks, even in areas that hadn’t been previously considered.
  1. If a disaster does occur, the cost of disruptions will be significantly reduced with a Business Continuity solution in place.
  1. They’re won’t be disruptions to services. Your competitive position will be maintained or even improved because you’ll be able to meet your guests’ requirements, where other business that aren’t protected won’t.
  1. Business operations will be enhanced when you identify areas of inefficiency or risk during the analysis part of your business continuity planning.
  1. The best benefit of a Backup & Disaster Recovery/Business Continuity Plan is your ability to deliver services and/or products regardless of business disruptions.

What Should You Do Now? 

Contact your IT support company in {city}.  Ask them to:

  • Identify Your Potential Risks.You likely already know when your riskiest time of year is for a weather-related disaster. And, of course, man-made disasters are always a risk. Mistakes by employees, vandalism, and data theft are threats to consider as well.
  • Assess Your Operations and Level of Preparedness.Look for flaws in your operations. Do you have a work-at-home plan for employees if they can’t get into your business? How will you communicate and collaborate with them? This is when a VoIP phone system and cloud computing can really help. Ask your IT support company about these and other technology solutions that will keep you working and connected.

Don’t Go IT Alone. You need an expert who’s trained in Business Continuity preparation and execution. This will give you peace of mind knowing that no matter the disaster, they will be there for you.

Give mProactive a call today to see how we can help you! Call now! (724) 261-3034

Call Now ButtonTAP TO CALL!