How a Rapid Response Can Save Your Business
Incidents involving hackers have been an ongoing problem which continue to increase significantly over the last couple of years. Developing damaging infections is less about "boasting rights" or pleasing the developer's ego and is becoming more and more about creating profit or commercial return.
Recent Ransomware Attacks
A great example is the recent attack on Baltimore City. The city is refusing to pay and have involved the FBI in the investigation to help to recover their data. Ransomware may be making a comeback with this recent attack in Baltimore named Robbinhood. This attack shuts down the majority of Windows’ services and then proceeds to encrypt the entire system.
Overshadowed by other major business news, mainly the trade war tension the United States is having with China, this ransomware attack has been under reported in the crypto press because of a high performance of cryptocurrency. Nevertheless, it is one of the most extensive attacks in history, affecting nearly every important aspect of city life in Baltimore.
The Boston Public Defenders Agency were compromised earlier this year, and similarly decided not to pay since they had back-ups – which took weeks to restore.
Backup and Recovery
The destruction of data on your computer system and corruption of programs your business must utilize in order to properly function is their primary intent. Most individuals associate an initial attack as being just a “bug”.
The reformatting of your businesses computer system and the loss of valuable data can be an incredibly painful experience.
Many times, clients will say “we have a backup system”, well…so did the city of Baltimore and every other city that has been attacked in this manner.
“It is not your back up system that is going to protect you from this type of situation….it is the Recovery Time.” Tom Blandford, CEO of eTrepid
Can your business survive for 9 days in counting?
Can your employees and customers survive for 9 plus days with all your data held hostage.
Would this deter your business from fully functioning or dare I say surviving?
More significantly these attacks are perceived as something that you only see on the news, something that only happens to the business down the street. Since there is no immediate profit in ransomware protection many companies don’t make it a priority to implement more advanced programs to combat these infections until it happens to them. Sadly, by then, it’s too late.
Ransomware isn’t the only way a hacker can turn your business into their business, there is profit for the hacker in turning your computer into a spam circulation device.
Ransomware, as the name suggests, holds data on your computer system "captive." Files on your hard drive are secured with a password. The user is then called and asked to pay a ransom to release the file. Does this sound familiar to what is going on right now today in the city of Baltimore. Here are some simple pointers and techniques to help prevent your computer developing into a "Zombie."
What is Spam
"Spam" is e-mail sent without the permission of the individual receiving the message. Hackers can then acquire control of your computer system through a “Trojan Horse” which gives them the same access rights as the user.
As soon as your computer is managed by the hacker it becomes known as a "Zombie." A group of zombie machines is referred to as a "botnet."
By managing a botnet, a hacker can generate revenue in a number of ways. The botnet can be utilized to extort a ransom from a business by threatening to or launching a destructive "Dispersed Denial of Service" (DDoS) attack versus its website.
According to the security software business Sophos over 50% of all spam email now stems from botnets.
Hackers use spam e-mail to drive traffic to pay-per-click marketing sites or distribute virus programs further. Using a zombie computer system assists cover their tracks.
What can you do to prevent ransomware:
- Keep your computer system up to date with the latest software application patches for Windows and other Microsoft programs. Most infections and other malware exploit vulnerabilities in widely used programs.
- Set up a trusted anti-virus program. Keep the definitions up to date and scan your computer system regularly.
- Set up an firewall or purchase a router with a software firewall program. Ideally you need a firewall solution which filters both inbound and outgoing traffic from your computer to the internet.
- Never ever open spam e-mail or associated e-mail attachments which is often used to disperse virus programs. Utilize a spam filter to help in reducing the quantity of spam you get.
Here at Etrepid.com, we understand the importance of protecting your business. Down time is critical in situations such as this and we make every second count. Please contact us today to make sure your business is protected!