Attacks like this usually enter an organization through email as an infected attachment, masquerading as something legitimate, which is accidentally executed by the user.
Ransomware viruses like this one are particularly damaging because they behave like a worm – after infecting and locking down one device, they continue to scan networks looking for more vulnerabilities (servers, desktops etc…) until they are stopped.
Effective security protection against complex attacks needs to be a multi-layered approach. The following controls—in combination—will offer the maximum protection for your business from this type of attack:
It’s important to realize that if you have a computer that is infected, paying the ransom is no guarantee that you will get your get files back. Having current and secure backups of your PCs and servers is an important step to protecting your company and your users from these kinds of invasive ransomware viruses.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
Here are some simple tips and reminders that you can share with your organization to help protect against the growing number of ransomware and phishing scams.
DO NOT – open attachments you were not expecting
DO NOT – enable macros when prompted
DO NOT – click on unknown links in email
DO NOT – send your credentials (your username and password) to anyone
DO NOT – reply to any unknown messages
DO – examine the sender (name and email address) of all emails critically
DO – examine all links and attachments carefully for unusual characteristics
DO – confirm with senders if emails from known users are unexpected or unusual
DO – report suspicious emails to IT administrators
Contact us if you’ve got questions about how you can better protect your organization.