Backups and Ransomware
With the influx of smarter and smarter malware, it’s never been more important to ensure that you have a good backup plan in place. Current trends are on the rise according to Security Magazine.
Threats to your computer system and data can come from a variety of sources. Cleverly disguised emails tricking you into opening the attachment can yield all types of attacks. What you think is an innocent download of puppies playing or even a PDF attachment that looks like something you’re expecting can be disastrous if you’re not prepared.
Sadly with the sophistication of todays Ransom-Ware, a simple click of a link, opening of an email or file could cause an infection that costs you dearly. First in the form of whether you decide to pay the ransom to get the virus removed. Doing so only funds further development but you have the option of paying for the fix from the criminals who developed the virus. Of course, there’s no guarantee you’ll receive the code to decrypt your files once you pay the ransom so you add insult to injury if you pay the ransom. Secondly, in the time and money it takes to recover assuming you’re files are no longer accessible.
The affected system or systems will need to be reformatted and completely restored from a recent backup (if you have one), load all software, printer drivers and start over. We have found that more and more businesses do not maintain adequate backups of their critical business or financial data. The latest numbers suggest that of those who have a catastrophic failure, more than 50% never fully recover.
How can we minimize these issues?
Education is first. We have to be educated on how the attacks may come to us.
- Make sure you know who’s sending you the email you’re receiving
- Is the email expected and makes sense and trust
- Attachments are verifiable
Prevention
- Keep a secure, verified backup (onsite and offsite)
- Updated high quality Antivirus Program (none of that free stuff), and monitor it closely
- Keep Security Patches up to date
- Stay alerted to bogus email offers, “you’re a winner” scams (all potential attacks)
- Suspect everything
- Beware of popups or emails that want you to update your accounts
- Use your bookmarks to access frequently accessed websites. Mistyping common websites may send you to the wrong place that will infect your system (gogle, goodle, whitehouse).
At A2Z, we offer a full line of services to remotely monitor and manage all aspects of your systems. From onsite and offsite image based and data backups to enterprise class internet security, primary and third party security patches, we have the Solution for you. Are you prepared?