Ransomware: The Threat Is Very Real | Microbyte

Ransomware: The Threat Is Very Real

scary

 

Above is a screenshot from one of the latest ransomware strains, dubbed ‘Jigsaw’.

The image above is one that is being used in ransomware attacks. Terrifying? Absolutely, but not just because of the disturbing image used; not because of the cocky, brazen tone that has been adopted – but because of the damage that they inflict on unsuspecting business owners.

The use of the image is a clever one; before the user even reads the accompanying text – they will be filled with dread and fear as the ransomware runs through their system, infecting it.

Jigsaw is fairly unique in the way that it operates; as well as infecting files in a different way than most other ransomware strains, it also begins to delete files as a punishment if you take ‘too long’ to pay the $150 dollar ransom. Jigsaw deletes an encrypted file every hour the ransom isn’t paid, making them unrecoverable even if the user pays the ransom. To add insult to injury – each time the user restarts the computer and logs into Windows – an extra 1000 files are deleted.

Just absorb that information; and think how much damage this would do to your business. If we are honest, it’s probably difficult to even comprehend. But due to the upsurge in ransomware emails being received recently, it is business critical that you are proactive in protecting your business from loss in the event of a ransomware attack.

 

phishing-email-shot

 

So How Can You Best Protect Yourself From These Attacks?

  1. First things first – NEVER open an attachment from a sender that you don’t know. Being diligent with your emails is one of the most effective ways that you can protect yourself. The email itself may not look suspicious, but if you don’t recognise the sender, refrain from opening the attachment all together. Opening the attachment will unleash the ransomware, where it will proceed to encrypt all files.
  2. Creating secure backups of your data regularly will mean that you can recover files in the event of an attack. Cloud storage has been one of the most popular option for back-ups, and as we recently wrote – we encourage all of our customers to adopt Itronis Cloud Backups. If you decide to use a USB or external hard drive for backups, be sure to remove them from the computer once the back-up is complete, otherwise they too will be infected.
  3. Yes, updating your software can be a minor irritation but many ransomware attacks actually happen when software isn’t up to date. Cyber criminals exploit unpatched bugs in software to introduce their ransomware. An example of this is the Cerber ransomware that was circulated via Adobe Flash Player. However, most ransomware is distributed via phishing emails.
  4. We all have a duty of care when it comes to staying safe online, along with the methods above, it is vital that we educate ourselves and keep informed of the various methods that are used. Learning how to recognise scam tricks, suspicious websites and phishing email techniques.
  5. Use Anti-Virus Software for protection. These should not be used instead of the tips above, but in conjunction with. We can offer you advice and guidance on anti-virus software and firewall protection. There are also malware scanning tools available for both Mac and Windows as well as anti-ransomware tool.

 

The threat of ransomware is one that is very real, and on the increase. By creating an environment that is aware and proactive when it comes to cyber-attacks, it lessens the chance of it happening to you and provides you with a means to minimise damage if it does. To not hesitate to contact us on 01733 577055 should you have any concerns or doubts on this matter.

 

Similar blogs

On-Premises vs Cloud Which is Best

On-Premises vs Cloud: Which is Best?

Small businesses and larger enterprises wrestle with managing their IT infrastructure, current requirements, and future demands. Choosing between on-premises and cloud computing is pivotal as it significantly changes the underlying approach to IT infrastructure and operations. Why Local Technology Was Previously Attractive? Previously, IT departments saw all technology-related operations as coming under their purview. As…

Read More

Avatar photo

Microsoft Authenticator vs Google Authenticator

Microsoft Authenticator vs Google Authenticator

Our digital lives in 2024 are increasingly complex. Effective security is essential to ensure nothing nefarious occurs. Manual password entry creates the risk of ‘shoulder surfing’ or other surreptitious methods used to discover your security information. Using two-factor authentication (2FA) or multi-factor authentication tools (MFA), such as Google Authenticator or Microsoft Authenticator mobile apps, substantially…

Read More

Avatar photo

Benefits of Copilot for Microsoft 365

Benefits of Copilot for Microsoft 365

Copilot is an Artificial intelligence (AI)-based tool to enhance creativity and time efficiency. Benefits of using this ChatGPT AI technology – Microsoft is an investor in the business – do not stop there. Depending on the version used, the interface generates useful responses based on meaningful inputs. Microsoft announced Copilot for Microsoft 365 and first…

Read More

Avatar photo

The Business Benefits of Cyber Essentials Certification

The Business Benefits of Cyber Essentials Certification

As IT continues to dominate and dictate international business, fortifying digital defences is paramount. Protecting your business from the devastating consequences of a cyber security breach should be a number one priority for every business.  The good news is that obtaining a Cyber Essentials certification is a simple and easy step to help protect against…

Read More

Avatar photo

Improve Your IT Helpdesk With SOPs

Improve Your IT Helpdesk With SOPs

As technology continues to drive businesses around the world, the role of IT helpdesks has evolved into a pivotal force, serving as the central point for user support and technical issue resolution. With organisations increasingly reliant on intricate digital infrastructures, the efficiency of IT helpdesks becomes paramount in ensuring seamless operations. Enter Standard Operating Procedures…

Read More

Avatar photo

A guide to switching IT Support Provider

A guide to switching IT Support Provider

The relationship between a business and its IT support company is a close one. With IT at the centre of almost every business, responsible for daily operations, goals, plans, feedback, data storage and communication, the right IT partner can be the driving force behind a company’s success. But as your business evolves, it’s essential to…

Read More

Avatar photo