Bank robberies are a way of the past. Today, theft happens online!
itro is determined to keep your data safe. Data means different things to different people: for businesses, data is about day-to-day operations, relationships and being profitable. For hackers, your data IS their business-profit!
Ransomware – sophisticated, malicious software – is being used by hackers to encrypt data files of Australian businesses and government departments via the Internet every day. All it takes is one person from your company to click a malicious link for an entire network to be infiltrated. Once files are locked, hackers extort money by demanding a hefty ransom to unlock your files. With attacks growing in reach and sophistication, data everywhere is at risk.
Even when a ransom is paid there is no certainty your hijacked files will be unlocked. By implementing five steps you can minimise the likelihood of your Practice being infected with a CryptoLocker.
The good news!
Adopt these five effective measures and protect your Practice against malicious cyber-attacks:
1. Stop it from reaching your ‘front door’.
2. Don’t let it through your ‘front door’.
- Educate your team to be cautious about opening attachments and clicking on links. Remember, the Internet is a doorway to your systems and data!
- Have a Watchguard firewall that supports deep level content inspection to prevent viruses entering your network. Just having the firewall is not enough though, it needs to be correctly configured to protect against these threats. The right firewall correctly configured is a vital step in preventing the Trojan from penetrating your network.
3. Stop or slow down the spread if it gets into your network.
Employ best practice password and internal security policies along with a top level Anti-Virus Security Suite, such as Webroot. Good internal security practices can stop a CryptoLocker in its tracks and allow your IT team to deal with it early before it infects and encrypts your PC or, even worse, your entire network.
4. Perform regular data backups.
A secure Backup Solution is the last resort to recovering your files in the case of infection. Have a ‘snapshot’ backup that runs continuously throughout the day to a destination that is NOT on your internal network. itro’s ‘Secure Backup’ solution keeps your data securely in an off-site location ready for speedy recovery.
6. Keep up with software updates.
For example, Windows 10 has numerous security improvements to the operating system that are not available in earlier versions of Windows. An effective device management solution is essential to ensuring your devices are patched and up to date. This is part of all itro Support Plans, starting from itro ‘Service Core’.
Ransomware poses a significant and tangible threat to your business, but implementing the above five steps will minimise your likelihood of being infected with a CryptoLocker.