Cybercrime is an unfortunate part of doing business these days. As much as new digital security measures help to keep consumers safe, there will always be cybercriminals working day and night to find new ways to infiltrate professional I.T. environments.
A recently popular type of ransomware is the “cryptolocker” variety, which works by encrypting a victim’s files (making them unreadable), and only offering the key to recover the files after a ransom has been paid. What’s more, as KMSI has recently learned, cryptolocker can be passed from user to user through Dropbox and other free cloud storage services.
The unfortunate reality is that when it comes to your business’ vulnerability to cryptolocker and other types of ransomware, it’s not a matter of IF, it’s a matter of WHEN. There are simply too many varieties of ransomware to guarantee total safety for your business. That said, there are still steps you can take to protect yourself:
- Don’t rely on free, unsupported software, such as the consumer version of Dropbox, pCloud or Mega. Applications such as this are unprepared to deal with the digital threats that face professional businesses like yours.
- Backup regularly and keep a recent backup copy off-site. Fires, floods, theft, accidental damage, and human errors can all cause data loss, so be sure to backup your data so you won’t have to worry about it falling into the wrong hands.
- Be cautious about unsolicited email attachments, especially when they’re from an unknown sender. If you know the sender and have any doubt about it, call them to confirm that they meant to send you the file and for what purpose.
- Patch early, and patch often, as malware often relies on security bugs in popular applications. The sooner you patch, the fewer open holes there are for cybercriminals to exploit.
Want to learn more about protecting your business from cryptolocker ransomware? Get in touch with KMSI today at firstname.lastname@example.org or call our staff at 403-274-7848 to discuss reliable I.T. security solutions and practices.