CryptoLocker, WannaCry, and Other Ransomware: How to Avoid Becoming a Victim (and What to Do if You’re Hit)

Use These Tips To Avoid Being Hit By Malware That Renders Computers Useless Until Cybercriminals Are Paid A Ransom

If your organization hasn’t been hit with ransomware, you’ve been fortunate. This is a growing type of cyber-attack that can render its victims helpless, forcing them to pay a ransom to regain access to their computer and/or important data.

 

What Is Ransomware?

 

Ransomware is simply a type of malware that infects a machine, locks it, and then requires the victim to pay money to remove the infection. Ransomware comes in many forms, but CryptoLocker is a version that has been especially rampant lately. It disguises itself as an email with a password-protected zip file supposedly from some logistics company. When the user unzips the file, the computer becomes infected, and a user’s documents are commandeered until the victim pays a ransom. WannaCry is another global attack that struck computers in “at least 150 countries,” causing up to $4 billion in damage.

 

How To Avoid CryptoLocker, WannaCry, And Other Ransomware Panic Just Yet!

To prevent yourself or any of your employees from falling victim to a ransomware attack, you can follow these steps: 

Network Computer 02 South Florida Managed IT Support Be Vigilant 

Be wary of emails from individuals you don’t know, especially those that contain attachments.

Network Computer 02 South Florida Managed IT Support Back Up Your Data

It’s imperative that you always back up your critical data. By doing so, you protect yourself from these types of attacks as well as hardware failures.

Network Computer 02 South Florida Managed IT Support If You Have A Backup, Don’t Pay The Ransom

If you do have a backup of your files, it’s recommended that you do not pay the ransom. Paying the ransom rewards cybercriminals. If possible, it’s best to restore your files from backup and not communicate with any individuals looking to take advantage of you.

Network Computer 02 South Florida Managed IT Support  Show Hidden File Extensions 

CryptoLocker typically arrives in a file with an extension of “.PDF.EXE,” which counts on Windows’ default behavior of hiding the file extension. Because the executable extension is hidden, individuals attempting to open it think it’s a PDF file. If you enable the ability to show hidden file extensions, it’ll be easier to spot these types of cyber-attacks.

Network Computer 02 South Florida Managed IT Support  Utilize Antivirus And Antimalware Software As Well As A Firewall

It’s important to have active antivirus and antimalware software in place and a firewall to help identify threats or suspicious behavior.

Network Computer 02 South Florida Managed IT Support  Update Your Operating System! 

Microsoft, Apple, and other software and hardware providers are constantly releasing security patches to help fight potential and known vulnerabilities, and it’s important to ensure that your machines are always up to date with these patches. It’s been determined that most successful WannaCry attacks could have been prevented with basic IT security measures, notably by keeping machines updated. That’s a $4 billion lesson.

Network Computer 02 South Florida Managed IT Support Work With An Experienced Managed IT Service Provider

It’s always a good idea to have an IT provider on speed dial if you fall victim to some ransomware. An experienced company can take immediate steps to deal with a bad situation – or keep you from experiencing it in the first place.

Reach Out To Network Computer Pros Today To Learn More About How To Prevent Ransomware

You might also like

Proactive Monitoring and Maintenance

Keep your business running & protected from external threats

Backup and Disaster Recovery

Recover & protect critical data from unexpected tragedies

Remote Employee Configuration and Monitoring

Secure your remote employee’s network access

Managed Antivirus and Malware Protection

Protect your business from sophisticated cyber attacks

Security Assessment and Training

Analyze your security posture & train employees to defend against the latest threats

Help Desk Access

Solve all your technical issues with a friendly & reliable helpdesk

Remote Setup and Monitoring

Protect remote workers with proper employee configuration

Network Management

Boost your productivity with efficient network management

Proactive Monitoring and Maintenance

Avoid downtime and fix issues as they arise

Backup and Disaster Recovery

Keep your business up & running throughout unforeseen events

Architecture Firms

Construction & Engineering

Non-Profit

Legal

Accounting Firms

Dental Offices

Hospitality

Small Businesses

Manufacture and Wholesalers