Stay ahead of your next bad day at work
More Ransomware, Encryption Viruses and Virtual Landmines
We’ve posted a few times about the latest Ransomware out there and the general outline of what they do, how to avoid them and the danger associated with their infection. Yet another is on the loose and the extent of the issue goes further and further.
Petya Ransonware doesn’t target file encryption isolating files and folders and even backup files; this Ransomware encrypts the hard drive itself. Without slipping into the nuts and bolts of what this means just know that’s bad, in fact, it’s really bad. Once encrypted you’ll have 3 options, recover from a proper backup, lose it all or pay a ransom.
As a business owner or management figure an inevitable task is outlining your Disaster Recovery plan; basically, what are you going to do when you lose your data, because a loss is an inevitable outcome given time. In order for computer owners to avoid infection, they must give themselves some type of capacity to handle said technical debacle.
Prepare a Disaster Recovery Plan
Start now by simply outlining your plan for disaster recovery (DR) and the technical professional responsible for your business operations. “Don’t worry I got it” may not do the trick; dig deeper. Specifically, if you lose your production systems what does that mean? Data loss, hardware failure, critical appliances (routers, firewalls), internet service, primary voice providers, platforms, etc… How long to restore operations if any or all of these things are lost. We refer to that as Business Survivability.
Past that, begin with a live test of your backup system. Employ a disaster Recovery platform that doesn’t revolve around Microsoft or a Windows-based backup. Over the last 24 months, technology has come quite a long way in the world backup and recovery and secondary systems, options are out there and affordable. Once DR is organized, work to avoid infection. Here’s a few things to consider:
- Most infections originate via email. If you don’t have a business class filtering system in place, you might already have common problems. Most businesses are working with some sort of filtering system in place, evaluate that system and increase protection as you see fit.
- It’s still possible for bad mail to get through. The infections can originate from a link within an email but most commonly now through an email attachment that seems harmless and a lot of times from a sender that is known and trusted.
- If you receive an email from a sender that’s not expected, with an attachment (.doc, .docx, .pdf and other seemingly harmless file types) it’s best to contact that sender and ensure that the message is legitimate.
Of course, an active antivirus and intelligent firewall platform is a must. Leveraging a business class platform; free versions are not options for business environments. There is value in using a system that is managed from one console and uses a common licensing as to not risk a lapse in coverage. For more detail on the items outlined here, please call the NOC at 904-471-0022 or email firstname.lastname@example.org.