Be Aware of Ransomware
Ransomware is a type of malicious software, or malware, which encrypts data on a computer making it unusable. Cyber criminals hold the data hostage until a ransom is paid. If the ransom is not paid, the data remains unavailable. They may also pressure you to pay the ransom by threatening to
destroy your data or release it to the public.
Although a variety of techniques may be used to infect systems with ransomware, the most common means of infection are:
- Phishing: Bad actors send phony emails with malicious files or links, which deploy malware if clicked.
- Remote Desktop Protocol (RDP) vulnerabilities: RDP is a proprietary network protocol that allows individuals to control the resources and data of a computer over the internet. Cyber criminals use a variety of tactics to obtain credentials, including purchasing them on the
dark web or using trial and error "brute force" attacks to access computer systems remotely. Hackers also use social engineering and pose as technical support representatives requesting access to your device. Once they have access, they deploy a range of malware – including ransomware – to systems. - Software and system vulnerabilities: Cyber criminals can take advantage of security weaknesses in software and systems that are outdated or have other vulnerabilities to gain access to your network and deploy ransomware.
Best Practices to Minimize Ransomware Risk
Don’t get locked out. Have a plan. Be prepared.
- Leverage the 3-2-1 rule when backing up your computer. Keep at least 3 copies of your data. Store 2 on different storage media and store 1 offsite.
- Use strong unique passwords, multi-factor authentication, and a password manager.
- Update and patch software and systems.
- Limit user access to only the data they need to perform their duties.
- Train your team not to enable macros on unknown or unexpected documents.
- Allow a technical support person access to your device only if you contacted them without any prior solicitation of service.
- Develop and practice your incident response plan.
Your security is our top priority. We will never contact you asking for your financial or personal information or ask a second person to log in to your computer to unlock your access. If you receive a message requesting sensitive information that claims to be from us, do not click any links, and contact us directly.
Cyber criminals only need to trick one person to gain access to your system. Sharing this information and training your team to identify suspicious emails – and not click them – is essential. As fraud continues to become more sophisticated it is vital to develop prevention programs and procedures to help safeguard your business.