Ransomware Protect Your Data

Ransomware Attack Protect Your Data: “How would you best protect your data against the latest ransomware and computer viruses?” IT Business advisory for best of help to avoid becoming victim of the latest ransomware and ever-changing computer virus risks and for best of top remedies. First published: May 16th, 2017.

What is Ransomware?

How does ransomware it compare with Computer Viruses?

When your information on your computers or internet storage becomes encrypted out of your control combined with a fee to restore normal access, this is essentially Ransomware. Even worse, use of delayed activation in the ransomware ensures unknown and continued usage and it spreading.

Unlike Computer Viruses which primarily are composed to compromise your privacy through unapproved data distribution, ransomware does not self propagate. It requires your activating it; usually by opening an Ad offer online, email attachment or program that installs the cause of encryption for a ransom.

The encryption is valid and is used by ecommerce sites such as Amazon and Scotiabank.

What good or best practices would I use to protect myself?

  1. Validate all email attachments, software and documents upon receipt prior to opening and being prompted for installation or making of changes.
  2. When opening websites that do not have a valid certificate, contact the source for verification. (Some local banks for example are in this state of online operating.)
  3. Check/validate/approve to run operating system updates before antivirus updates (see next for why.)
  4. Make backups in archive form regularly and according to your exposure to risk; check them for functioning at intervals.
  5. Do not keep backups on your computer which you backed up; store off site.

What would happen if I use the software options available; suddenly in a frenzy?

Because encryption is an inseparable part of information operating requiring security and privacy, the idea of using software (antivirus apps) to automatically identify valid risks, determine action is not recommended.

The app, or antivirus software, is too late. It may even block the real and valid preventive measures from being provided to you where needed. 

Since it runs on your operating system, for stand alone users in particular, your best and possibly only option is to patch your operating system in a timely manner; aside from/in addition to best practices above. (See your automatic operating system updater or contact your network administrator for help.)

For network users, the operating system is too slow when compared with what comes first. This would be the network operating system and communications.

The way to protect your network and connected stakeholders would be to upgrade/patch/install a firewall (network edge appliance) to analyse all data and information passing in/around/out of the network.

It would almost eliminate the need for antivirus software in the case of virtualized network environments (when done right.)

For help to patch stand alone computers, networked computers and Business IT.

For Windows operating systems https://microsoft.com go to Windows updates.

Please receive how to Get the latest Windows patch and scanner for beating WannaCrypt, WannaCry, WannaCryptor, or Wcry



Security Scanner:


For other operating systems go to your operating system site and go to updates.

For Business IT check your network administrator.

For select updated antivirus scanners integrating the above patch, and decryptors, please see the following.

Kaspersky: Kaspersky

Mcafee: Mcafee

What to do if I get infected?

Immediate stop of computer system usage. Power down. Check that your computer technician knows the risks of working on the infected/affected system and that technician begins by isolating the problem. The right procedure will assure you of quick and near total recovery of your data and information. In most cases, the real damage to your information is caused by faulty disaster recovery procedures.

Time tested good practices prevent losses. CERN has proven to be a good example for the rest of us thus far.

Source: Cern

Author Recommended

S911 ITSM™ Firewall Network Security Solution

About the author: Christian A. Benjamin

Found this information helpful? Something of value to add? Please leave a clean respectful Reply.

This site uses Akismet to reduce spam. Learn how your comment data is processed.