Ransomware is a quickly growing form of cyberattack that can have devastating consequences for an individual or business. Ransomware is a type of malware, not unlike a virus, that infects a system and locks out access to extort money from the user or business. Losing access to data and software can be devastating to a business that relies on it and attackers make use of that to extort large sums of money from them.
There are very few options once your system has been infected with a carefully crafted ransomware attack. So don’t wait until ransomware becomes a problem to begin looking to defend yourself. There are several options you can use to prepare and protect yourself against ransomware attempts on your data.
Be Aware of the Common Methods of Attack
For malware to infect your system, it must get into your system. There are different ways that an attacker can accomplish this, but all of them are avoidable if you are vigilant and stay aware.
Emails and messages are likely one of the most common means of attack. Phishing emails pretend to be official emails that seek to get information or access to a system. If an email has an attachment or link, clicking it could install malware, including ransomware, onto your system. Once malware infects your system, it can use your contact list to send copies of itself to all your friends and colleagues. We’ve talked about phishing emails before if you want to learn more about how to identify them. In general, if you receive an email with a link or attachment, check that you know for certain that it’s from a trusted source. Look for any subtle mistakes or anything that seems off, especially with the sender’s address. If you’re uncertain at all, contact your IT department to be sure. All of this can apply to social media messages as well.
An artist’s depiction of phishing
Another source of malware such as ransomware is suspicious websites. Do not download anything from a website or click buttons, links, or popups unless you’re certain the website is a trusted source. Even if it looks like an official website, double check the URL and look for suspicious mistakes. If you’re uncertain or the website feels suspicious, leave the site immediately.
Attackers will also sometimes use harmless-looking devices to access your computer. Check out our previous article to learn more about these devices, but the important thing is to not connect any device to your computer if you don’t know where it came from. Even if it seems like a thumb drive that someone dropped, and you want to identify it to return it to the owner. Do not connect your computer to any unfamiliar Wi-Fi networks. Hackers can use these devices to install ransomware onto your computer.
Keep Your Software Up to Date
Your computer and network’s security software helps keep you safe even if malware manages to slip onto your system. Sometimes you may miss something or an attacker uses a new avenue of attack you didn’t expect and some ransomware manages to get onto the system. Your antivirus, anti-malware and firewall systems are your next line of defense to catch the malware that squeezes through.
Remember to update often
An up-to-date security software system can regularly scan for and detect suspicious activity and isolate it before it does any damage. These systems usually work by recognizing patterns of code or behaviour associated with malware, but attackers are constantly trying to change their method of attack to get around these systems. For that reason, the makers of anti-malware software are constantly releasing updates to stay ahead and keep your system safe. Make sure these updates get installed so your system is not vulnerable to attack from new techniques.
Attackers also regularly look for flaws in your systems and software to find a new method of attack. Whenever software companies become aware of a vulnerability in their system, they create an update or patch to fix the issue. You also want to make sure your systems and software is always up-to-date, especially your operating system.
DigitalJTI offers system maintenance services so we can keep all of these systems up to date for you. Allow us to make sure your computer isn’t vulnerable to attack.
Keep Your System Backed Up in Case of Emergency
Even with all of the above advice, some especially slippery ransomware from an especially clever attacker may still slip through. If you are properly prepared, these attacks can become no more than a minor annoyance. If you keep your system and files backed up on a separate platform, in the event of a ransomware attack taking away your access, you can simply wipe your system and restore it to regain access.
If you would like help maintaining system and software backups for your computer, we offer backup and recovery services that can get you up and running in minimal time in the event of a ransomware attack.
Conclusion
Ransomware attacks can be devastating to individuals and businesses, costing large sums of money and loss of business. But if you know what to look out for and are prepared, you can reduce the threat significantly. Don’t let your system be held ransom, be aware.
5 Business Security Tips to Protect Your Workplace
In the digital age we find ourselves in, security is more important than ever before. Keeping customer and employee personal information, sensitive business information and assets out of the hands of would-be attackers requires cooperation from every person in a business. All it takes is one person thinking a suspicious situation is harmless to result in an attacker gaining access.
For many, the very word “hacker” draws to mind a mysterious figure in a hoodie sitting in a dark room and typing furiously on a keyboard. It seems to be all about password cracking and creating backdoors into systems. Either they’re too good to be stopped or a good enough firewall will keep them out, right? However, while there are some brute-force ways to attack a system the reality is that most hackers operate more like con-artists and scammers; piecing together pieces of information from discarded documents and gaining the trust of unsuspecting employees.
This approach to beating security is known as social engineering and it is one of the most insidious weapons in an attacker’s arsenal. It takes advantage of the fact that people tend to let their guard down when everything seems normal and safe. Even the most level-headed and reasonable person can be fooled by social engineering if they don’t have reason to believe the behaviour is suspicious. We at DigitalJTI have compiled a list of 5 security tips that you can use to identify suspicious behaviour so you can help keep your workplace and your personal information safe from attack.
#1 Do Not Leave Sensitive Information Where Others Can Find It
This one seems deceptively straight-forward, but it can take a lot of awareness and discipline to keep information from slipping into the wrong hands. Desks and garbage bins seem like they’d be safe from intrusion, but they’re favored places for information gathering for attackers. You should be careful to file and dispose of documents, even informal ones, properly.
Beyond the obvious, you should pay special attention to business information such as names and personal information of employees and customers, internal phone numbers, dates and times of meetings and other internal events and anything else that’s not publicly available. This sort of information can help an attacker gain access to the system or provide a lead to where they can get that access. If you’re uncertain, it’s better to treat the information as sensitive.
Documents should be carefully organized and stored to prevent unwanted access. Sticky notes with reset passwords or a business card with a colleague’s personal email should be carefully tucked away in a secure place if still needed or destroyed if not. If left on a cluttered desk, even for a few minutes, they can be easily viewed by someone walking by or quickly searching your desk. Sensitive documents should be filed away somewhere that can’t be accessed quickly and easily by someone looking. If they must be stored on the desk surface, keep them organized and stored in a way that they can’t be easily identified at a glance. The more time it would take for a would-be attacker to find something, the less likely they will be to take the risk of being caught. A clean and organized desk goes a long way towards this and allows you to quickly recognize if something sensitive goes missing so you can report it.
Documents with sensitive information to you or the business that are no longer needed shouldn’t be simply discarded in the trash. Hackers have been known to dig through garbage bins and dumpsters to find sensitive and useful information. Sensitive documents should be shredded or thoroughly torn up to ensure they cannot be read by anyone getting them. A general policy of shredding all discarded documents would be even better to ensure nothing slips through.
Properly Disposed Documents
#2 Do Not Put Sensitive Information Online
This is another one that appears simple on the surface. Anything that gets put online can have a traceable record and can be potentially accessed by anyone from anywhere. This can be as simple as sending the password to access the online store in an email to a coworker or posting on Facebook to complain about a meeting you must attend this weekend.
A savvy hacker can potentially breach a less-secured system or monitor wireless signals to steal data as it is transferred. You should be especially careful of anything posted publicly or used in a public place such as a coffee shop. Some hackers use devices known as packet sniffers to snatch signals such as emails through a network which they can then access if they’re not properly encrypted.
Even basic information that seems harmless can be used by attackers. Good social engineers can piece together shreds of information from multiple people. A Facebook post with a couple employee names here, a Tweet about a meeting there, and an attacker can build up the information necessary to launch their intrusion attempt. If it’s information the business doesn’t actively make public, it’s best to avoid putting it in a public place just to be safe.
#3 Be Wary of Unknown People Even If They Seem Like They Belong
Social engineers are good at pretending they belong and coming across like they know you. You likely believe that you’ll immediately recognize a would-be intruder as suspicious, but it’s not as straight-forward as we tend to think.
Is he a rushed coworker or a potential hacker? How could you tell?
Consider this: have you ever had someone come up to you who knows you by name and is friendly, but you don’t remember them? Maybe they were introduced by a mutual friend or they met you at an office event. Likely you didn’t want to admit you didn’t remember them and chose to be friendly back. Chances are they were who they said they were, but this is exactly the kind of situation where social engineers shine. This is also where the information from tips #1 and #2 can be useful to attackers. They can make their presence in the company seem more authentic if they can show they know your name and face (which they got from a document in the dumpster) and can recount a funny story from the recent office Christmas party (which they saw you post about on Facebook). If you don’t remember them and they can’t prove their identity, don’t trust them with access to the office or documents.
A common trick for social engineers is to act like someone official who just needs their password reset or access to an area to do their job. They make you feel sympathetic to put you off guard; they’re in a hurry, their boss is breathing down their neck, and they were so flustered they forgot their password, couldn’t you just help them out? Even if they seem like they belong and you feel like you should give them a break, don’t help them if you don’t recognize them and can’t confirm they should have access. Instead, find someone who can confirm their identity and access such as an administrator or the IT department to help them out.
#4 Do Not Interact with Suspicious Messages
Another common tactic for would-be hackers is trying to get information electronically, especially via email or social media. This is known as phishing and can be as insidious as the methods mentioned in tip #3. We’ve all probably seen obvious phishing attempts: poorly worded messages requesting banking info or password resets. It can be easy to conclude that phishing messages are easy to identify, but this is not always the case. Some attackers use carefully crafted emails that look nearly identical to official emails sent by a company.
Another risk from messages is malware: dangerous software meant to harm or steal from your computer, such as viruses. A message may contain an official-looking link or attachment, such as what appears to be a Word document from your department head. Clicking on such an attachment or link can give the malware a chance to install itself on your computer where it can damage the system or even copy files and data to send back to the hacker.
If you receive any emails or social media messages that appear official, but request sensitive or personal information, or have attachments or links, take a moment to confirm the email is from a trusted source. Look for small mistakes in any images, logos, or titles, and confirm that the sender name and email is correct. Mistakes and misspellings, especially in the sender name or address, can indicate a phishing message. If you’re uncertain, contact your IT department for advice.
#5 Beware of Suspicious Devices
Our last tip for today covers a couple seemingly-harmless devices hackers can use to trick people. If you find a lost USB thumb drive, do not use it. It may seem like someone forgot it on a table or dropped it on the floor. You might think you should plug it into a computer to see if you can identify who it belongs to so you can return it. However, while most thumb drives are simply a storage device for files, a hacker can set one up to automatically access your system when plugged in, stealing the data on your computer, or creating a backdoor access for them. Then they just have to leave it somewhere where it looks like it was forgotten. If you find a thumb drive or similar device, instead ask around to see if you can find who lost it or turn it over to your IT department to deal with.
This could harm your computer
Another device some hackers use, sometimes called a pineapple, appears like a regular Wi-Fi router. However, it can track any data sent through it by computers that connect to it. They’re often named in ways that seem sensible. If you notice a new open Wi-Fi network appears near your workplace, or the coffee shop you’re taking your lunch break in has a second Wi-Fi network with the same or similar name, do not connect to it.
Conclusion
Attackers have a wide range of subtle techniques for getting access to sensitive information. But they can be stopped if we all remain aware and vigilant. You should always be careful with how you manage sensitive documents and information and destroy them properly when they’re no longer needed. You should be careful of people and messages who can’t be identified, even if they seem legitimate. You should be careful of unfamiliar digital devices even if they appear innocuous. Security starts with the individuals and so long as we’re all alert and careful we can keep our businesses safe.