{"id":4037,"date":"2019-07-31T12:13:46","date_gmt":"2019-07-31T03:13:46","guid":{"rendered":"https:\/\/www.filingbox.com\/?p=4037"},"modified":"2022-12-06T22:39:26","modified_gmt":"2022-12-06T13:39:26","slug":"how-to-protect-yourself-from-ransomware","status":"publish","type":"post","link":"https:\/\/www.filingbox.com\/en\/blog\/how-to-protect-yourself-from-ransomware\/","title":{"rendered":"How To Protect Yourself From Ransomware"},"content":{"rendered":"To protect yourself from ransomware, first, you should know exactly <a href=\"https:\/\/www.filingbox.com\/blog\/what-is-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">what Ransomware is.<\/a>\n\nRansomware is a type of malware that encrypts the data of a computer and demands a ransom (usually paid in CryptoCurrencies) in order to retrieve or unlock the files from the device.\n\nAlthough Ransomware has been around for decades, they have grown increasingly advanced in the last few years with their capabilities to spread, evade detection, encrypt files, and their ability to force users into paying the ransom.\n\nThis is why modern Ransomware is so dangerous, as it is almost impossible to break without completely restoring your files.\n\nThere are so many different forms of Ransomware, which use a wide array of areas to attack, such as:\n<ul>\n \t<li>Out of Date Operating System exploits (Windows XP, Vista and un-updated Windows 7 are all known to be vulnerable)<\/li>\n \t<li>Compromised Website\u2019s<\/li>\n \t<li>Outdated\/Vulnerable Internet Browsers and Extensions<\/li>\n \t<li>Malicious PDF\u2019s and Zip files sent through email<\/li>\n \t<li>Unsecure public Wifi<\/li>\n<\/ul>\n<h2>&nbsp;<\/h2>\n<h2>Protecting yourself from Ransomware<\/h2>\nRansomware protection involves keeping good habits when using a computer and the internet.&nbsp;\n\nFor example, you should:&nbsp;\n<ol>\n \t<li>Ensure your computer has a Firewall, AntiVirus and reliable AntiMalware programs.<\/li>\n \t<li>Keep your operating system up to date.<\/li>\n \t<li>Ensure your software is up to date.<\/li>\n \t<li>Keep your internet browser and plugins up to date.<\/li>\n \t<li>Keep your files <a href=\"https:\/\/www.filingbox.comterprise\/\">backed up in a secure location<\/a>.<\/li>\n \t<li>Remain vigilant against spoof emails.<\/li>\n \t<li>Avoid suspicious websites and downloads.<\/li>\n<\/ol>\nWith these good housekeeping methods in place, your computer will be protected from most malware, and in the case of an unexpected attack, you\u2019ll be able to restore your files and computer without having to pay a Ransom. &nbsp;\n\n&nbsp;\n\n<img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-4039\" src=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/macbook-336704_960_720.jpg\" alt=\"\" width=\"960\" height=\"640\" srcset=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/macbook-336704_960_720.jpg 960w, https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/macbook-336704_960_720-300x200.jpg 300w, https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/macbook-336704_960_720-768x512.jpg 768w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/>\n<h2>&nbsp;<\/h2>\n<h2>How to protect a business from Ransomware<\/h2>\nIt\u2019s not enough to just protect your own devices from Ransomware when it comes to business.\n\nBusinesses are not exempt from Ransomware, in fact, they are prime targets for Cyber-Criminals. Ransomware costs businesses around the world more than <a href=\"https:\/\/phoenixnap.com\/blog\/ransomware-statistics-facts\">$75 billion per year<\/a>. It\u2019s important to create safe work processes and a secure environment for workers, both in-office and remote.\n\nEnsuring employees understand basic cybersecurity awareness such as Email Spoofing and the dangers of compromised websites, dangerous downloads and unsecured wifi is a must. Having a company-wide security policy and ensuring that new and old employee\u2019s alike stick to it is essential.\n\nWith a business, the network is crucial. One compromised device can cause problems for the entire network. Make sure each computer is secure, with up to date antivirus and malware programs, active firewalls and up to date operating systems.\n\nIf ransomware does get past your antivirus, it\u2019s likely that your antivirus update will be able to remove the attacker from your system \u2013 However, the problem remains that this does not unencrypt your files. The only reliable guarantee of recovery is maintaining a hardened cloud backup of your important files.\n\nIt\u2019s important to back up your data; But backing up to an external hard drive, or even to the cloud is not enough. Some Ransomware is specifically designed to search out backup devices, even over the network and cloud storage. This means everything gets encrypted with little hope of a restore.\n\nProtecting against this can be done through an external backup drive that you can then detach and keep separate from your network or using a secure cloud service such as <a href=\"https:\/\/www.filingbox.comterprise\/\">FilingBox<\/a>.\n\nFilingBox is a network file server that prevents ransomware attacks. FilingBox operates on your PC as a network drive, but files are only able to be modified when requested via Windows Explorer, which protects them from ransomware attacks that try to encrypt files since it provides files with read-only access. &nbsp;\n\n&nbsp;\n\n<img decoding=\"async\" class=\"aligncenter size-full wp-image-4040\" src=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/cyber-security-2776600_960_720.jpg\" alt=\"\" width=\"960\" height=\"540\" srcset=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/cyber-security-2776600_960_720.jpg 960w, https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/cyber-security-2776600_960_720-300x169.jpg 300w, https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/cyber-security-2776600_960_720-768x432.jpg 768w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/> &nbsp;\n<h2>History of Ransomware<\/h2>\nIn 2017, the FBI\u2019s Internet Crime Complaint Center received&nbsp;<a href=\"https:\/\/pdf.ic3.gov\/2017_IC3Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">1,783 ransomware complaints that cost victims over $2.3 million<\/a>. These, however, are only the tip of the iceberg, according to <a href=\"https:\/\/www.statista.com\/statistics\/494947\/ransomware-attacks-per-year-worldwide\/\" target=\"_blank\" rel=\"noopener noreferrer\">a report from Sonicwall, 204 million ransomware attacks<\/a>&nbsp;were seen last year alone.\n\nRansomware isn\u2019t new, in fact, it has been used for decades, commonly targeting the healthcare industry. According to <a href=\"http:\/\/www.beckershospitalreview.com\/healthcare-information-technology\/first-known-ransomware-attack-in-1989-also-targeted-healthcare.html\" target=\"_blank\" rel=\"noopener noreferrer\">Becker\u2019s Hospital Review<\/a>, the first known ransomware attack occurred in 1989! Of course, this first ransomware attack was simple and held many flaws, with attackers writing their own encryption scripts.\n\nToday, however, it has evolved into a much bigger threat, both in terms of accessibility with \u201coff-the-shelf\u201d Ransomware products such as \u201cransomware-as-a-service\u201d and Ransomware Toolkits that are available to malicious actors, combined with the increased sophistication of these programs.\n\nRansomware was uncommon, so protection against it wasn\u2019t needed until recently. It was in the mid-2000s that attacks started to become more common as they were able to utilize the extra sophistication in Ransomware tools and encryption algorithms such as RSA encryption.\n\nIn 2011, a ransomware worm emerged that imitated the Windows Product Activation notice, making it more difficult for users to tell the difference between genuine notifications and threats. &nbsp;\n\n&nbsp;\n\n<img decoding=\"async\" class=\"aligncenter size-full wp-image-4041\" src=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/Ransomware-MS-window-1-edit.png\" alt=\"\" width=\"660\" height=\"317\" srcset=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/Ransomware-MS-window-1-edit.png 660w, https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/Ransomware-MS-window-1-edit-300x144.png 300w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/>\n\n&nbsp;\n\nBetween September and December 2013, <a href=\"http:\/\/www.theinquirer.net\/inquirer\/news\/2320452\/cryptolocker-ransomware-has-infected-quarter-of-a-million-systems-since-september\" target=\"_blank\" rel=\"noopener noreferrer\">CryptoLocker infected more than 250,000 systems<\/a>.\n\nIt earned more than $3 million for its creators before the botnet that was used to carry out the attack was taken offline.\n\nCryptolocker\u2019s files were analyzed and a tool was built to restore encrypted files, however, Ransomware continued to evolve with several imitation Ransomware variants being born that is still unbreakable.\n\n&nbsp;\n\n<figure id=\"attachment_4051\" aria-describedby=\"caption-attachment-4051\" style=\"width: 508px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/https:\/\/www.computerworld.com\/article\/2485214\/cryptolocker-how-to-avoid-getting-infected-and-what-to-do-if-you-are.html\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4051 size-full\" src=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/cryptolocker-508p-100390630-orig.png\" alt=\"\" width=\"508\" height=\"284\" srcset=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/cryptolocker-508p-100390630-orig.png 508w, https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/cryptolocker-508p-100390630-orig-300x168.png 300w\" sizes=\"(max-width: 508px) 100vw, 508px\" \/><\/a><figcaption id=\"caption-attachment-4051\" class=\"wp-caption-text\">A CryptoLocker ransom message. Image via Computer World.<\/figcaption><\/figure>\n\n&nbsp;\n\nCryptoWall became one of the biggest Ransomware threats and by mid-2015, CryptoWall had extorted over $18 million from victims, pushing the <a href=\"https:\/\/arstechnica.com\/security\/2015\/06\/fbi-says-crypto-ransomware-has-raked-in-18-million-for-cybercriminals\/\" target=\"_blank\" rel=\"noopener noreferrer\">FBI to release a warning<\/a>&nbsp;about this threat.\n\nIn 2015, a group known as the Armada Collective carried out a string of attacks against Greek banks. 20,000 bitcoin (\u20ac7m) was demanded from each bank.\n\nLarger companies also face big threats and ransoms have been reported to be&nbsp;<a href=\"http:\/\/www.cnbc.com\/2016\/02\/17\/ransomware-is-targeting-us-companies-of-all-sizes.html\" target=\"_blank\" rel=\"noopener noreferrer\">as high to $50,000<\/a>, though a ransomware attack last year against a Los Angeles hospital system, Hollywood Presbyterian Medical Center allegedly demanded a ransom of $3.4 million.\n\nIn March of 2016, Petya (now being offered as a ransomware-as-a-service) began to operate.\n\nPetya was incredibly dangerous as it could make a computer completely unusable, replacing its boot record with a ransom note rather than loading. &nbsp;\n\n&nbsp;\n\n<figure id=\"attachment_4043\" aria-describedby=\"caption-attachment-4043\" style=\"width: 696px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Petya_(malware)\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4043 size-full\" src=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/PetyaA.jpg\" alt=\"\" width=\"696\" height=\"559\" srcset=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/PetyaA.jpg 696w, https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/PetyaA-300x241.jpg 300w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-4043\" class=\"wp-caption-text\">Petya Ransomware Notice, courtesy of https:\/\/en.wikipedia.org\/wiki\/Petya_(malware)<\/figcaption><\/figure>\n\n&nbsp;\n\nOn Black Friday (November 25) of 2016, the <a href=\"https:\/\/arstechnica.com\/security\/2016\/11\/san-francisco-muni-hit-by-black-friday-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">San Francisco Municipal Transportation Agency fell victim to a ransomware attack<\/a> that disrupted train ticketing and bus management systems.\n\nAttackers demanded 100 Bitcoins as a ransom ($73,000 at the time). SFMTA was able to restore its systems and not pay the ransom, however, it was sobering for many to see.\n\nThe systems were down for two days, allowing passengers to ride for free during this time. Mamba or HDDCryptor is thought to be the Ransomware used in this attack. &nbsp;\n\n&nbsp;\n<h2>Summary<\/h2>\nRansomware is a terrifying reality in the modern world.\n\nProtecting yourself from Ransomware should be a priority when doing anything online. As we&#8217;ve seen, this can be done through the use of antivirus, malware and firewalls, along with a strong external backup.&nbsp;\n\nAt FilingBox, we firmly believe that adding the right prevention solution to your workflow is the safest way to protect yourself from ransomware.\n\n<!-- \/wp:post-content -->\n\n<!-- wp:paragraph -->\n\nClick <a href=\"https:\/\/www.filingbox.com\/request-demo\/\">here<\/a> to request a free demonstration of the ultimate ransomware prevention solution.\n\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n\nFor more details about <a href=\"https:\/\/www.filingbox.com\/\">FilingBox,<\/a> contact us at <a href=\"mailto:sales@filingbox.com\">sales@filingbox.com<\/a>&nbsp;or call us on +1-813-445-7472.","protected":false},"excerpt":{"rendered":"<p>To protect yourself from ransomware, first, you should know exactly what Ransomware is. Ransomware is a type of malware that encrypts the data of a computer and demands a ransom (usually paid in CryptoCurrencies) in order to retrieve or unlock the files from the device. Although Ransomware has been around for decades, they have grown [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":4038,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10],"tags":[],"class_list":["post-4037","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news"],"jetpack_featured_media_url":"https:\/\/www.filingbox.com\/wp-content\/uploads\/2019\/07\/hacker-1944688_960_720.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/posts\/4037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/comments?post=4037"}],"version-history":[{"count":11,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/posts\/4037\/revisions"}],"predecessor-version":[{"id":8339,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/posts\/4037\/revisions\/8339"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/media\/4038"}],"wp:attachment":[{"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/media?parent=4037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/categories?post=4037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/tags?post=4037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}