{"id":1900,"date":"2020-07-22T17:05:19","date_gmt":"2020-07-22T20:05:19","guid":{"rendered":"https:\/\/microhills.com\/?p=1900"},"modified":"2020-07-22T17:05:19","modified_gmt":"2020-07-22T20:05:19","slug":"how-to-protect-yourself-from-ransomware","status":"publish","type":"post","link":"https:\/\/microhills.com\/index.php\/2020\/07\/22\/how-to-protect-yourself-from-ransomware\/","title":{"rendered":"How to Protect Yourself from Ransomware"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">How to Protect Yourself from Ransomware<\/h1>\n\n\n\n<p>Ransomware is a quickly growing form of cyberattack that can have devastating consequences for an individual or business. Ransomware is a type of malware, not unlike a virus, that infects a system and locks out access to extort money from the user or business. Losing access to data and software can be devastating to a business that relies on it and attackers make use of that to extort large sums of money from them.<\/p>\n\n\n\n<p>There are very few options once your system has been infected with a carefully crafted ransomware attack. So don\u2019t wait until ransomware becomes a problem to begin looking to defend yourself. There are several options you can use to prepare and protect yourself against ransomware attempts on your data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Be Aware of the Common Methods of Attack<\/h2>\n\n\n\n<p>For malware to infect your system, it must get into your system. There are different ways that an attacker can accomplish this, but all of them are avoidable if you are vigilant and stay aware.<\/p>\n\n\n\n<p>Emails and messages are likely one of the most common means of attack. Phishing emails pretend to be official emails that seek to get information or access to a system. If an email has an attachment or link, clicking it could install malware, including ransomware, onto your system. Once malware infects your system, it can use your contact list to send copies of itself to all your friends and colleagues. We\u2019ve <a href=\"https:\/\/mig.microhills.com\/2020\/07\/22\/5-business-security-tips-to-protect-your-workplace\/\" data-type=\"post\" data-id=\"1883\">talked about phishing emails before<\/a> if you want to learn more about how to identify them. In general, if you receive an email with a link or attachment, check that you know for certain that it\u2019s from a trusted source. Look for any subtle mistakes or anything that seems off, especially with the sender\u2019s address. If you\u2019re uncertain at all, contact your IT department to be sure. All of this can apply to social media messages as well.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e07622e919b&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e07622e919b\" class=\"aligncenter size-full wp-lightbox-container\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1998\" height=\"658\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/mig.microhills.com\/wp-content\/uploads\/2023\/01\/image.png\" alt=\"Securing your digital world - a combination key imagery underscoring the vital role of cybersecurity in protecting your online presence\" class=\"wp-image-206162\"\/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">Cyber Security<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Another source of malware such as ransomware is suspicious websites. Do not download anything from a website or click buttons, links, or popups unless you\u2019re certain the website is a trusted source. Even if it looks like an official website, double check the URL and look for suspicious mistakes. If you\u2019re uncertain or the website feels suspicious, leave the site immediately.<\/p>\n\n\n\n<p>Attackers will also sometimes use harmless-looking devices to access your computer. Check out our <a href=\"https:\/\/mig.microhills.com\/2020\/07\/22\/5-business-security-tips-to-protect-your-workplace\/\" data-type=\"post\" data-id=\"1883\">previous article<\/a> to learn more about these devices, but the important thing is to not connect any device to your computer if you don\u2019t know where it came from. Even if it seems like a thumb drive that someone dropped, and you want to identify it to return it to the owner. Do not connect your computer to any unfamiliar Wi-Fi networks. Hackers can use these devices to install ransomware onto your computer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Keep Your Software Up to Date<\/h2>\n\n\n\n<p>Your computer and network\u2019s security software helps keep you safe even if malware manages to slip onto your system. Sometimes you may miss something or an attacker uses a new avenue of attack you didn\u2019t expect and some ransomware manages to get onto the system. Your antivirus, anti-malware and firewall systems are your next line of defense to catch the malware that squeezes through.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1280\" height=\"640\" src=\"https:\/\/mig.microhills.com\/wp-content\/uploads\/2020\/07\/update_button-1.jpg\" alt=\"Enhance your cybersecurity defenses through routine software updates \u2013 a pivotal practice to ensure resilience against emerging digital risks\" class=\"wp-image-1912\"\/><figcaption class=\"wp-element-caption\">Remember to update often<\/figcaption><\/figure>\n<\/div>\n\n\n<p>An up-to-date security software system can regularly scan for and detect suspicious activity and isolate it before it does any damage. These systems usually work by recognizing patterns of code or behaviour associated with malware, but attackers are constantly trying to change their method of attack to get around these systems. For that reason, the makers of anti-malware software are constantly releasing updates to stay ahead and keep your system safe. Make sure these updates get installed so your system is not vulnerable to attack from new techniques.<\/p>\n\n\n\n<p>Attackers also regularly look for flaws in your systems and software to find a new method of attack. Whenever software companies become aware of a vulnerability in their system, they create an update or patch to fix the issue. You also want to make sure your systems and software is always up-to-date, especially your operating system.<\/p>\n\n\n\n<p>DigitalJTI offers <a href=\"https:\/\/mig.microhills.com\/microhills-system-maintenance\/\" data-type=\"page\" data-id=\"427\">system maintenance services<\/a> so we can keep all of these systems up to date for you. Allow us to make sure your computer isn\u2019t vulnerable to attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Keep Your System Backed Up in Case of Emergency<\/h2>\n\n\n\n<p>Even with all of the above advice, some especially slippery ransomware from an especially clever attacker may still slip through. If you are properly prepared, these attacks can become no more than a minor annoyance. If you keep your system and files backed up on a separate platform, in the event of a ransomware attack taking away your access, you can simply wipe your system and restore it to regain access.<\/p>\n\n\n\n<p>If you would like help maintaining system and software backups for your computer, we offer <a href=\"https:\/\/mig.microhills.com\/microhills-system-maintenance\/\" data-type=\"page\" data-id=\"427\">backup and recovery services<\/a> that can get you up and running in minimal time in the event of a ransomware attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Ransomware attacks can be devastating to individuals and businesses, costing large sums of money and loss of business. But if you know what to look out for and are prepared, you can reduce the threat significantly. Don\u2019t let your system be held ransom, be aware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to Protect Yourself from Ransomware Ransomware is a quickly growing form of cyberattack that can have devastating consequences for an individual or business. Ransomware is a type of malware, not unlike a virus, that infects a system and locks out access to extort money from the user or business. Losing access to data and software can be devastating to &hellip;<\/p>\n","protected":false},"author":1,"featured_media":1901,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-1900","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-jeabs-technologies-inc-jti-blog-posts"],"_links":{"self":[{"href":"https:\/\/microhills.com\/index.php\/wp-json\/wp\/v2\/posts\/1900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/microhills.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microhills.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microhills.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microhills.com\/index.php\/wp-json\/wp\/v2\/comments?post=1900"}],"version-history":[{"count":0,"href":"https:\/\/microhills.com\/index.php\/wp-json\/wp\/v2\/posts\/1900\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/microhills.com\/index.php\/wp-json\/wp\/v2\/media\/1901"}],"wp:attachment":[{"href":"https:\/\/microhills.com\/index.php\/wp-json\/wp\/v2\/media?parent=1900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microhills.com\/index.php\/wp-json\/wp\/v2\/categories?post=1900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microhills.com\/index.php\/wp-json\/wp\/v2\/tags?post=1900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}