Five Tips to Avoid ransomware

Ransomware has emerged as the dominant online security threat to home users and small businesses. They are distributed through spam or phishing emails that trick users into clicking on malicious links. After infection, malicious software encrypts and locks the computer files, making them inaccessible until the victim has to pay the ransom that scammers demand, usually in Bitcoins.Cryptography ransomware

“Justifiably, nearly one in three corporate security professionals report that they would be willing to pay for recovery of their encrypted data. Meanwhile, the average user at home feels like they have no choice but to pay,” said Usman Choudhary, chief product officer at ThreatTrack Security.

No one is immune, not even law enforcement. We have already reported about a police station in Massachusetts that paid 500 dollars to the blacksmiths to decipher his records.

Let's see how you can protect yourself from ransomware:

1. Back up your data: Always keep at least one copy of your data. There are also many cloud-based services that have options for automatically backing up your data and sending it to a server. So besides being able to retrieve your files after a ransomware attack, you are also protected in the event of a natural disaster, destruction of the disk, and so on. This is by far the best of succumbing to extortion.

2. Schedule backups: Back up your data automatically. Schedule the job and stay calm. It would be good to back up once a week, though the best one would be once a day.

3. Be aware of phishing emails: Educate yourself. Educate your family members and associates. Show them all the latest social tactics (social engineering) used to entice interested parties to click on malicious links and attachments.

There are many resources that can help you. In addition to iGuRu.gr, there are online tutorials and security training and awareness services. With your daily update on spam, malware, spear-phishing, etc. – you will help your colleagues, or your family become more careful by spotting phishing attempts, which often appear to come from a trusted source: a friend, a partner, or your favorite online .

4. Securely use your computer Update your software: Another technique used by developers of ransomware writers is to exploit vulnerabilities in popular software applications. If you are diligent in updating the applications on your computer, you will minimize your exposure to possible attacks. For the better, make sure all your apps can be updated automatically. The most dangerous and targeted applications are: Adobe Reader and Flash, Java, Internet Explorer, Microsoft Office, Google Chrome, iTunes, Skype and Firefox.

5. Keep your work and your personal data and files separately: A recent survey showed that nearly one-third of security personnel were asked to remove malware from a host's computer because they had left a family member to use it (or at least that's what most claim). With so many people working from home (many small businesses operate entirely from home), it can be difficult to separate job data from personal data. But keeping these two separate worlds can greatly help protect your data and minimize the impact of an attack.

Finally, if you are hit by ransomware, immediately disconnect any connection. This means shutting down your computer and disconnecting it from the network. So if it has already been done , θα σταματήσετε την εξάπλωση του κακόβουλου λογισμικού σε άλλα συστήματα ή .

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.089 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).