Staying Cyber-Secure in the Age of Ransomware
By Tyler Greenwood, Back To Business I.T.
Threats to information systems are multifaceted and come from a variety of attack vectors. Criminal enterprises have an abundance of resources they can use to cripple computers and accomplish their missions. One of the most lucrative for these organizations and also one of the most potentially destructive is ransomware - a malicious software that utilizes “cryptoviral extortion” that encrypts and locks user files. Unfortunately, the ransomware also tries to encrypt any file or drive on any network machines that are connected to the infected system.
Once these files are encrypted, the software demands the victim pay their criminal enterprise to free their files; Bitcoin, a digital currency that has gained extreme popularity since its introduction in 2009, is generally the preferred payment method. Due to the nature of Bitcoin payments, these funds are mostly untraceable and therefore protected from authorities easily tracking them down. Once payment is received, the user receives a key to decrypt their files. Perhaps the most famous ransomware in recent years was “CryptoLocker” which caused incalculable headaches for users around the world. CryptoLocker’s ransoms gathered millions of dollars from infected users before the enterprise running it was shut down, but it spawned countless clones who have continued their proven method of generating money.
Fortunately, there are ways to mitigate one’s risk to ransomware. Backups are incredibly important – and not just for ransomware. Having a recoverable backup allows for the relatively quick restoration of data that rests on an infected machine. The compromised system is refreshed with a non-infected version from a safe point in time. Furthermore, avoidance of ransomware is one of the best ways to ensure system continuity. Most attack vectors come in the form of executable files found on the internet. The criminals disguise emails in a way that makes them appear to come from the Post Office or other delivery services. They state there is a package waiting and attach a file that seems to contain details of the delivery. Once opened, the code begins to implement its malicious mission. Educating users and encouraging them to report suspicious emails is a huge help to IT departments and prevents many infections.
Call a BBB Accredited computer consultant like Back to Business I.T. to schedule a free technology assessment to see how secure your company’s systems are.