How To (and How Not to) Handle Ransomware

How To (and How Not to) Handle Ransomware

From individuals all the way up to companies and governments, ransomware has been causing no small amount of stress for some years now. Let’s take a few moments to discuss this threat, what you can do about it, and how seriously the government is taking ransomware.

What Kinds of Ransomware Are Out There?

While there are many kinds of ransomware out there, they usually rely on similar tactics to work. Just consider some of the most common ransomware variants out there:

  • Cerber - Cerber targets Microsoft 365 users through an elaborate phishing campaign.
  • CryptoLocker - One of the most famous ransomware strains, it is a copy of the original that was shut down back in 2014.
  • CryLocker - CryLocker uses a personalized ransom note using the encrypted files on a person’s computer or server, locking a person out of their computer entirely. 
  • Locky - Spread through phishing, this ransomware instructs users to enable macros to read the message. Once that’s complete, the malware will start encrypting files, and demanding a ransom.
  • Jigsaw - When triggered, Jigsaw will delete one or more files every hour for 72 hours. If the ransom hasn’t been paid when the 72-hour window is up, all the affected files are deleted.

What You Can Do to Avoid Ransomware

Of course, avoiding potential data encryption and deletion needs to be the priority for all businesses. That means that you and your users will have to work to avoid ransomware. Here are a few practices that can help:

  1. Never click on unverified links
  2. Do not open email attachments unless they are from a trusted source
  3. Don’t download files from websites you don’t trust
  4. Do your best to avoid giving out personal data
  5. Don’t use USB or SD card drives that you didn’t purchase yourself
  6. Keep your software patched and updated, including security software
  7. Utilize antivirus, firewall, and other security software
  8. Use a virtual private network on public Wi-Fi
  9. Backup your data onsite and in the cloud
  10. Use a mail server with spam protection and content filtering software

 Just in Case You Do Get Ransomware…

Unfortunately, it only takes on slip-up to let in a threat. While a total of $380 million has been spent trying to retrieve the data that ransomware has locked up, we cannot recommend this course of action—for several reasons:

  • The attack might be fake
  • You may not get all your data back
  • The hackers could leave malware behind 
  • You set a precedent that you will pay if attacked
  • You are reinforcing the notion that hacking and scamming is
  • profitable

 It is such a bad idea, that many areas in the United States are considering making it illegal to pay the demands. All paying does, after all, is encourage this kind of extortion while also painting your company as an easy target. The U.S. Treasury has gone on record to say that paying up in response to such extortion could put your business in legal trouble.

 Of course, you don’t have to resist ransomware and other threats alone. BNMC can assist you in several ways, including implementing a backup and disaster recovery platform capable of restoring any data that an attacker encrypts. Learn more by reaching out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 23 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Microsoft Network Security Software Hackers Efficiency Business Data Workplace Tips Hosted Solutions Hardware Computer Google Malware Communication IT Services IT Support Small Business Mobile Devices Smartphone Internet Mobile Device Android Cloud Computing Tech Term Data Recovery Phishing Ransomware Managed IT Services Backup Smartphones Innovation Users Outsourced IT Windows VoIP Saving Money Miscellaneous Upgrade Cybersecurity Network Information Microsoft Office Social Media Data Backup Disaster Recovery communications Passwords Quick Tips Facebook Browser Windows 10 Business Continuity Server Office 365 Business Management Productivity Internet of Things Managed Service Managed IT Services Data Management Apps Windows 10 COVID-19 App Collaboration Vulnerability Word Remote Monitoring Analytics Save Money Gmail Artificial Intelligence Gadgets Remote Work Mobile Office Encryption Conferencing Chrome Managed Service Provider Money Remote Workers Infrastructure WiFi Government Router BYOD Google Drive Website Display Company Culture Networking VPN Access Control Employer-Employee Relationship Paperless Office Settings Virtual Reality IT Support Spam Applications Tip of the week Information Technology Holiday Antivirus Risk Management Bandwidth Maintenance Content Filtering Firewall Office Tips Document Management Education Apple Storage Wireless IT Management Data Security Big Data Robot Business Technology Automation Virtual Private Network Development Employee-Employer Relationship Hacker Data storage End of Support HIPAA BDR Unified Threat Management Operating System YouTube Wi-Fi Computers Avoiding Downtime Administration Compliance Business Intelligence Customer Relationship Management Scam Best Practice Retail Alert Mouse Vendor Break Fix Search Regulations Going Green Laptop Augmented Reality Monitors iOS Solid State Drive The Internet of Things MSP Vendor Management Printing Managing Stress Identity Theft Chromebook Password Training Server Management IT Hard Disk Drive Cybercrime Touchscreen Downtime Social Network Managed Services Managed IT Marketing How To Tablet Remote Computing Computing OneNote Outlook Data Breach Data loss Mobile Security Bring Your Own Device SaaS Social Windows 7 LiFi Two-factor Authentication Telephone Systems Virtualization Software as a Service Managed IT Service desktop Hosted Solution Humor Print Toner Myths Specifications Meetings Disaster Current Events Slack Hard Disk Drives Digital Scary Stories Hotspot Internet Exlporer Dark Data Update FBI IT Technicians Optimization Inventory Messaging Running Cable Connectivity Remote Content Huawei Heating/Cooling Multi-Factor Security Leominster Asset Management Entertainment Modem FinTech Politics Battery Digital Signage Data Warehouse Time Management Printer Buisness Staff Cryptocurrency Shortcuts Mobile Management Black Friday Uninterrupted Power Supply Virtual Desktop IT solutions Work/Life Balance Peripheral Monitoring Solid State Drives Spyware Sports Language Value Google Docs Customer Service K-12 Education Mirgation Hacks Recycling Office Samsung Shadow IT Employee-Employer Relationships Emergency Computer Care IBM IoT Health Private Cloud user treats Streaming Processor Servers Google Calendar File Sharing Bitcoin K-12 Schools Memes Hybrid Cloud Dark Web Cookies Google Wallet Tech Support Files Troubleshooting Business Analysis Network Management Security Cameras Profiles Cyber Monday Social Networking Management Spying National Security Computing Infrastructure Business Growth Professional Services Instant Messaging Chatbots eWaste Social Engineering Gamification Analysis Students Corporate Profile Star Wars Legal Shopping Human Error Memory Legislation Wearable Technology Windows 8 Network upgrade Twitter Scalability Microsoft Excel G Suite Unified Communications Nanotechnology Drones Websites RMM Virus SharePoint Automobile Utility Computing Smart Technology Dell Motherboard Cables Policy Updates Techology Alerts USB Cabling Identity Mobile Device Management Continuity Safety Mixed Reality Lenovo WannaCry Fraud Deep Learning Cost Management Employees Device Reducing Cost Statistics Smart Office Holidays Migration Consulting Mail Merge Blockchain Screen Reader Charging Banking LED Threats Downloads Google Maps Distribution Laptops Shortcut Distributed Denial of Service Wires Procedure PowerPoint VoIP Unified Threat Management Licensing Alt Codes Dongle Network Congestion Bluetooth Comparison Solar Firefox Superfish Halloween Assessment Gig Economy Mobility Batteries Work Writing Payment Card Address Permissions Smart Tech Budget Reviews Co-Managed IT Logistics Managed Services Provider Patch Management Voice over Internet Protocol PCI DSS Onboarding GDPR User Error Digital Payment Cooperation Typing Service Level Agreement Tracking Cleaning Computer Repair Relocation CCTV Mobile Data Webcam How To Recovery Black Market Error Point of Sale Ben McDonald shares Law Enforcement Notifications Electronic Medical Records Travel Physical Security Printers Upgrades Gadget Supercomputer CrashOverride Emoji Motion Sickness Crowdsourcing Staffing Taxes Personal Information Botnet Administrator Cortana Web Server what was your? 3D Printing IT Budget Mobile Computing GPS Processors IT Consultant Regulation Machine Learning Financial Cameras Unsupported Software

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3