What is a Ransomware
It is malicious software that takes personal data hostage. It detects and uses any security breach of information systems. Once the fault is exploited, the virus encrypts (military-level encryption) all of the user’s data. The last step is to ask the owner to send money in exchange for the key that will allow them to decipher them. This makes operating your information system 100% unusable.
A Concrete Case
Last week, one of our customers with a server and 8 connected workstations was the victim of an attack of this type. All of the data and applications were then inaccessible. The only effective method was the complete restoration of the computer system. This results in the re installation of the server and user terminal operating systems. We also had to reset network equipment and printers. The resumption of normal activity was carried out in 72h.
6 Ways To Reduce The Risk of “Ransomware” on Your Network.
1. More complex passwords
Set up a complex password (both on your computer and your mails). The password must be at least 8 characters long with uppercase characters, digits and special characters.
2. Watch out for spam!
The best place to contract the virus is the mailbox! Simply opening an infected attachment may be enough to contaminate the entire corporate network. Check the sender’s address is known or consistent.
3. Up-to-date systems and antivirus
Regularly update your operating system and anti-virus software. Computer security companies are slowly deploying “vaccines” to prevent this type of attack.
4. Backup your data
Having a reliable and comprehensive backup system (an external backup in the cloud or on k7 RDX is a real advantage in the event of an attack).
5. Secure your connection
Limit or secure remote connections on information systems (maximize secure VPN connections). If the Microsoft Remote Desktop is used, it is better to set up an alternative.
6. Anticipate the risks
Possess a “PRA” or “Recovery Plan”. This document details the methodology to be adapted in the event of a disaster. It allows to return to a normal activity with the shortest possible delays. A PRA consists of relocation procedures, backup procedures, the list of service providers involved and any other information that may facilitate restoration.