Tuesday, 13 March 2018 14:48

RANSOMWARE PART I

Written by
Rate this item
(0 votes)

 

The daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of your business. There are so many different things that can attack your computer, steal your data, and wreck your day. One of the most troublesome has been the development of ransomware. (FYI. Ransomware isn’t actually all that new– some version has been around for decades)  Ransomware is a type of computer virus that takes your data hostage and like any kidnapping scheme, demands money for the release of your data.
Why is ransomware so nasty? Because it steals the most important thing your business possesses. Data. Worse, once infected there isn’t generally a way out. No one can “disinfect” your machine. You aren’t going to be able to call in IT support to solve the problem. Basically, you have three options.
  1. Pay the ransom. This payment is usually via credit card or bitcoin (a digital currency). Some ransomware viruses even provide help lines if you’re having trouble. Of course there are no guarantees your will get access to your data–these are thieves you’re dealing with.
  2. Don’t pay and lose your data – This has its obvious downsides, unless…
  3. You have a safe, clean backup. In that case, you are stuck with the nuisance of restoring your data with the backup, but you aren’t out any money. However, this comes with a caveat: your backups have to be clean. The problem with ransomware viruses is that just making backups may not be sufficient to protect your data, as the backups can be infected also. In the next blog, we will address your need to add an additional layer of protection to handle ransomware attacks.
Read 109253 times
Jordon Darling - CISSP

Jordon is the President/CEO of  HITECH. He is a business minded security professional who has a passion for people and small business.  Some of his certifications include: CISSP, CSSA, MCPS, MCNPS, MS, SA

61016 comments

  • Comment Link Schoenfelder Tuesday, 17 September 2019 02:10 posted by Schoenfelder

    I have included this blog post to my favorites

  • Comment Link Paganico Tuesday, 17 September 2019 02:09 posted by Paganico

    Many thanks posting this particular message and rendering it public

  • Comment Link Tippins Tuesday, 17 September 2019 02:09 posted by Tippins

    I've included this document to my favorites

  • Comment Link Shigley Tuesday, 17 September 2019 02:09 posted by Shigley

    I have added this post to my book marks

  • Comment Link Mclarty Tuesday, 17 September 2019 02:09 posted by Mclarty

    I've included this document to my book marks

  • Comment Link Selmon Tuesday, 17 September 2019 02:09 posted by Selmon

    Many thanks conveying this particular document and making it public

  • Comment Link Gabler Tuesday, 17 September 2019 02:09 posted by Gabler

    Thanks for writing this article and making it public

  • Comment Link Urbino Tuesday, 17 September 2019 02:09 posted by Urbino

    Many thanks stating this statement and rendering it public

  • Comment Link Mccollister Tuesday, 17 September 2019 02:05 posted by Mccollister

    Came across this article curious, added to multiply

  • Comment Link Alfieri Tuesday, 17 September 2019 01:59 posted by Alfieri

    Located this blog post engaged, added to jumptags

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.