Technology Advisor Blog

Ransomware:  Don't be a victim!

Posted by Ann Westerheim on 10/23/18 2:26 PM

Ransomware_Blog_10-2018We hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of personal data accessed. In these cases the criminals behind the attack hope to get money by selling that data to other criminals. In the case of ransomware, the criminals want your money, and try to get it by holding your data hostage. Plain, old fashioned kidnapping with a hi-tech spin.  It's not about how much your data is worth to them, it's about how much it's worth to you.
 
It's not just happening far away, the attacks are local as well.  Earlier this year, the Leominster School District here in Massachusetts got hit with Ransomware and ended up paying $10,000 Ransom.  
 
What can you do to avoid falling victim?
 
Prevention is the best cure. Follow standard “data hygiene” principles that you probably hear about all of the time. Update your operating system, software, and apps whenever a new release or patch is released. Do this ASAP. Some patches may be released solely as a result of the discovery of a vulnerability. Watch out for phishing scams. If anything looks “off” about an email, don’t open it. And never open links you aren't totally sure of. Some people recommend sending the email back to the sender, but we advise against this because you may just be "raising your hand" for the bad actors.  If you get, for example, an email from your credit card company, instead call the number on the back of your card.
 
The most important thing you can do to make sure your data cannot be held ransom is strictly adhering to a regimen of backups. However, even backups may not be foolproof. If your data has been infected and you are unaware of it, or the backup is not segregated from your network, your backups may also be corrupted. Given the severe consequences of a ransomware attack to any business, consider having a security evaluation done by a managed service provider who will have the security expertise to advise on the best backup protocols for your situation.
 

Topics: cybersecurity, ransomware

Subscribe by Email

Most Popular Posts

Browse by Tag

See all tags...

Connect With Us

Older Blog Posts

For older Ekaru blog posts, go to ekaru.blogspot.com.