Live Chat

Free Download 10 Point Data Backup Checklist Download Now

Sign up and get instant access to our
10 Point Data Backup Checklist

Protect Yourself Against Ransomware (Part 2)

Protect Yourself Against Ransomware (Part 2)

Proactive Computer Repair and Protection for Businesses in Metro Vancouver Fraser Valley and Abbotsford

Proactive Computer Repair and Protection for Businesses in Metro Vancouver Fraser Valley and Abbotsford

PROTECT YOURSELF AGAINST RANSOMWARE (Part 2)

In this series we’ve been discussing ransomware and, in our previous post, we provided the “go-to” measures that most of us take when considering network security, especially protecting our files against ransomware.  Many of us wouldn’t think past establishing virus protection and backing up our computers, and there’s no shame in that, but there are certainly measures that can be taken to give our security an added boost.  In this post we’ll continue where we left off, with our remaining three methods for protection against ransomware.

NUMBER 3:  CHECK PRIVILEGES

When ransomware attacks a workstation on a multi-user network such as your office computers, it utilizes the compromised persons permissions to encrypt files on an individual’s local computer and the network.  To ensure that the attacker’s file access is limited, you can make sure your staff only have access to the files and drives they need; avoid unnecessarily providing global permissions to your entire staff.  Limiting permissions to those who need them means limiting access for ransomware.

NUMBER 4:  EDUCATE YOUR STAFF

Training your staff can make all the difference when trying to prevent a ransomware attack.  One of the primary means of access to your computers and network is when staff open the proverbial gate and let the attackers walk in.  Providing your staff with some training around recognizing malicious emails and avoiding certain types of websites can go a very long way.  More often than not, employees haven’t intentionally invited ransomware onto your network.  More likely, they were simply uninformed and let their guard down.



ONE OF THE PRIMARY MEANS OF ACCESS TO YOUR COMPUTERS AND NETWORK IS WHEN STAFF OPEN THE PROVERBIAL GATE AND LET THE ATTACKERS WALK IN.



NUMBER 5:  SET UP A STRONG FIREWALL

Even with the above training, mistakes can be made.  But you can support your staff’s efforts by installing a proper enterprise-grade firewall that uses packet inspections.  These powerful defense systems not only prevent the usual suspects, but they inspect network traffic for any malicious payloads that may be hidden deep within files as they’re transferred to and from your computers.

Once you’ve got a strong firewall assisting you in protecting your files, you should access its application control function and choose to “block malware activity.”  This will give your firewall specific orders to focus on these types of threats. Additionally, it would be wise to establish a policy and appoint specific people that will ensure your firewalls, servers, desktops, anti-virus firmware, and patches are current. After all, there is no point in running a firewall that used to be strong a year ago.

Don’t feel bad if you’ve been unprotected for some time now.  But it is definitely advisable to get set up as quickly as possible.  Ransomware isn’t one of those problems that you can see coming. Once it hits, if you’re not secure, you may face critical and irreparable file loss.  We’ve covered 5 ways to prevent your PC from being taken hostage by ransomware and now it’s up to you to take the first step.

If you have any questions about ransomware or if you think you’ve fallen victim to it, feel free to get in touch with us at www.nexthop.ca or by leaving a comment below.

 

 

Speak Your Mind

*

Free Download 10 Point Data Backup Checklist Download Now

Sign up and get instant access to our
10 Point Data Backup Checklist

Show Buttons
Hide Buttons