computer shock

Avoid Being Held Hostage! Ransomware: What Is It and How Can I Protect Myself?

As technology constantly evolves, we find ourselves facing ever more disruptive threats. That’s why it is absolutely critical we remain diligent in protecting ourselves from new dangers and stay proactive in our security posture.

An increasingly prevalent computer threat is ransomware.

Ransomware is designed not to corrupt or even steal your data but to hold it hostage and require payment of a “ransom” to get it back. Two widespread examples are CryptoLocker and CryptoWall. Based on FBI estimates between April through June 2015, the latter generated over $18 million for its perpetrators.

Commonly, ransomware comes as a harmless-looking email attachment from what appears to be a trusted source. When the unsuspecting user clicks the attachment, it installs a small program that immediately searches for your data on local drives, network shares, and even cloud-based storage. Once found, the data is encrypted, rendering it inaccessible. Attempts to access your files result in a prompt to pay a ransom to “unlock” the data and reverse the encryption.

This devastating program was depicted in an episode of CBS’s drama, The Good Wife. An employee unknowingly installs ransomware within the firm’s network, locking all the information at a law firm until a ransom of $50,000 is paid within 72 hours. In reality, typical ransom fees are lower but no less devastating for a company that can no longer access any of its critical data.

Imagine how disruptive this is for businesses in this predicament. In many cases, companies with no disaster recovery plan find themselves paying the ransom. As reported by this Wall Street Journal article, according to Tom Kellermann, chief cyber security officer for Trend Micro, Inc., “Around 30% of ransomware victims pay to regain their data.”

All of this underlines the importance of having high quality, up-to-date computer security implemented within your IT infrastructure.

What can you do to protect yourself? Here are seven tips:

  1. Educate everyone using devices attached to your business’s network of the issue (you can forward this article to them right now!).
  2. Use caution when interacting with email. Delete anything suspicious. When opening attachments, check the sender’s email address first. If it looks dubious, verify its legitimacy prior to opening. If it doesn’t feel right, it probably isn’t!
  3. Exercise extreme caution prior to clicking website popups even if they appear legitimate. If you’re unsure, ask for a second opinion. Better to be safe than sorry.
  4. Only download and install browser plugins and extensions from industry standard, verified sources.
  5. Install computer and network security software that includes regularly updated anti-malware, antivirus, email scanning, and web/content filtering capabilities. The combination of multiple security products designed to handle particular threats provides the best protection.
  6. Keep all computers’ operating systems and applications current with the most recent patches and security updates.
  7. Implement (and regularly audit) a backup strategy that offers a short recovery time and flexible file restore options. This is often the most neglected area by businesses though it’s one of the most important – especially in the case of a ransomware attack. A good backup strategy gives you the ability to quickly restore data to a known good state prior to the infection, avoiding the need to pay a ransom.

If you have a security question, please call us at 314.394.3001 to discuss this topic in-depth. Whether it’s for your network, computers, or mobile devices, we at Anderson Technologies are here to help you find not just any solution for your security needs but the best solution for your business.

Like this article?  If so, check out another article here: Data Security: Just How Secure Will Your Business Be in 2016?

St. Louis Company Software upgrade

Six Reasons Not to Perform a Software Upgrade

When should I upgrade my software? What do you do when the notice comes to update?

Some blindly click “OK.” Others ignore update messages for months on end. Some now-wary computer users have horror stories about how their digital lives came to a screeching halt for several days due to glitches associated with a software upgrade.

Whether it’s an update to your smartphone’s operating system or Microsoft’s enticement for a free copy of Windows 10, our world is full of opportunities to upgrade to the latest version of everything. Our instinct may be to immediately upgrade, following the logic: “Of course I want the latest and greatest! Think of all the ‘new and improved’ features I’ll be able to take advantage of!”

But wait just a moment. There are good reasons to exercise a little caution.

Here are six to make you think twice before hitting “OK”:

  1. You haven’t recently backed up your data, email, contacts, photos, videos, etc., to an external source – doing so enables recovery if the upgrade goes horribly wrong.
  2. Your hardware doesn’t have the capacity to effectively run the updated software. If you’re running older computers, upgrading to new software may consume more memory and disk space or overly tax the CPU, potentially bringing your machines to a screeching halt and resulting in unplanned hardware purchases.
  3. The user interface of the new software is so foreign compared to the existing version, productivity is negatively impacted while you learn its idiosyncrasies.
  4. All bugs aren’t fully ironed out of the new software. Unless your business absolutely requires a particular feature the new software offers, let other users “stub their toe” on corner-case problems. Wait a few months to upgrade.
  5. You‘ve misplaced the necessary information (software license keys, passwords, etc.), which may be needed during the upgrade process. Locate all required information for the update prior to proceeding.
  6. Updating existing software might result in being unable to access old files, which for business reasons must be left in their original format. Make sure the new software works with older file versions without needing to convert them.

Before hastily updating software to the latest version, consider the impact on other aspects of your business’s technology and work flow. After performing a complete backup, carefully review the software’s requirements before making the decision to move forward. Determine if you will truly benefit from the upgrade.

If you need a second opinion before undertaking a software update, please don’t hesitate to give us a call at 314.394.3001. We’d love to help!