April is Ransomware Preparedness Month - Are You Ready?

How to Prevent Ransomware Attacks

Posted by Joshua Patten on Apr 10, 2018 7:54:00 AM
Joshua Patten

Companies, and even individuals, need to be aware that so-called "ransomware" is a growing concern. One of the primary methods a malicious person uses to holds data ransom is to encrypt the contents of your hard drive and demand money, usually in the form of cryptocurrencies such as Bitcoin, in return for the key to decrypt the files.

 

  Closeup portrait, senior mature man, looking shocked, scared trying to protect himself in anticipation of unpleasant situation, isolated white background. Negative emotion facial expression feeling

 

About 28% of ransomware victims simply pay up which gives hackers enough money and motivation to keep wreaking havoc. Those who do not pay the ransom generally experience significant downtime. On average it takes 21.4 hours to recover the encrypted files and/or restore the infected computer(s).

 

So, what can companies do to prevent ransomware?

 

  1. Keep current backups of everything. Make sure this includes employees who work from home or who travel and use a personal laptop. You should educate your employees on the potential risks of not backing up all of their data. If the infected hard drive is properly backed up then it can be wiped and reinstalled with minimal data loss. Keep multiple backups, at least one of them in a different location from the primary drive.

  2. Use reputable antivirus and antimalware software. Although the software cannot stop all ransomware attacks (viruses and antivirus software are in something of an arms race and virus software cannot stop brand new malware), it can stop many of them. 

    Woman working on computer ready press enter button isolated grey office wall background. Funny funky crazy looking girl excited what she see on laptop screen browsing internet. Face expression emotion

  3. Make sure everyone in your organization practices good email hygiene. Some simple steps that can be followed:
    • Never open unsolicited attachments.
    • Do not provide personal information in email and never email passwords.
    • Have your IT department or managed service provider configure your email server to block .exe and .vbs files, which are more likely to contain malware.
    • Bear in mind that hackers and phishers commonly make their email look like it comes from somebody in your contacts list. If in doubt, call the person and ask if they sent the attachment.
    • Be especially careful with .xls, .xlsx, .doc, and .docx files. If you open a strange file and it contains macros, do not enable them.

  4. Turn on show file extensions. One trick hackers use is double extensions, such as .jpg.exe. In this case, the file will look like a .jpg, a harmless image file, but could actually be a malicious executable.

  5. Disable remote services such as remote desktop unless you really need them. This can help isolate an infected computer and prevent the ransomware from spreading through the network.

  6. Implement least privilege access control to files on your network. While this is a complicated subject that requires an experienced IT professional to implement, the basic premise is that computer users within your organization should only be allowed access to files and resources necessary to complete their duties. For example, an accounting employee should generally not have access to detailed human resources information, and a human resources employee generally should not have access to accounting information.

There are a lot of other things you can do. So, what do you do if you do get infected?

 

Blindfolded senior businessman trying to catch dollar bills banknotes flying in the air on gray wall background. Financial corporate success or crisis challenge concept

 

  1. Do not pay if at all possible. As long as some companies continue to pay, the hackers will be encouraged. The fewer people pay up, the better. Additionally in some cases, people will pay the ransom and not get access back. Paying the ransom can also mean you are more likely to be targeted again.

  2. If possible, roll back to an earlier backup of your system. Windows users can use System Restore. Macs are less likely to be infected, but if they are, you can start up while holding down command and R, which will boot you to Mac OS X Utilities. From there, Reinstall OS X should get your system clean and you can then restore any lost data from Time Machine. Then check for missing data. With some versions of ransomware, this is all you need to do. With others, you will need to move on to the next step.

  3. Getting your data decrypted. If restoring from a backup did not get you your files back, then you will probably need to get a data recovery company on the case. (This generally means that the ransomware got your backups as well, which means it is often a good idea to keep one reasonably recent set of backups, or at least your most important files, on a drive not connected to your computer). This can be expensive.

 

One last thing you can do is have a business continuity plan in place. By making sure that you have backup plans, you can handle any downtime caused by malware. We can handle all of your customer inquiries and questions while you recover from the malware, or any other problems you might have.

 

Business Continuity CTA Button with Network Graphic

Topics: Information Technology

Tips from an Experienced Call Center

50 Years of Insight

1. Learn how to streamline your operations around the latest and most effective business communication strategies. 

2. Get the upper hand by learning how to get the most out of your relationship with your communications partner:

  • Answering Service
  • Call Center
  • Virtual Receptionist

3. Know what to look for when hiring a communications partner.

Select "Posts by Topic" to read tips about your specific industry.

Subscribe for email updates and be first to access our latest communication tips. 

 

Subscribe to Email Updates

Recent Posts