Showing posts with label protect your files. Show all posts
Showing posts with label protect your files. Show all posts

Wednesday, February 8, 2017

Ransomware Will Reign Again This Year

Ransomware is the latest evolution in cyber threats and malicious Internet schemes. Last year, more businesses were struck by ransomware than ever before, and that trend is expected to continue. As a result, it’s essential for all professionals to learn more about ransomware and how to defend your company.

What is ransomware?
Ransomware is a program that infiltrates a computer system and restricts access to the system or certain files. The software encrypts data so you need a key to access it. For example, when the St. Louis Public Library suffered a breach, some 700 computers at 16 branches were affected by ransomware. The attack affected both the computers designated for public use and those used by library staff. The necessary access key is only provided once a sum of money is paid, and—like any ransom—payment doesn’t guarantee a successful return outcome. Some files may be lost permanently.

Why is ransomware successful?
Ransomware schemes work because perpetrators know that data is power. Attackers can interfere with operations or damage a company’s reputation. These hackers know they’re more likely to be paid if they request a relatively small dollar amount; it’s often cheaper for a company to pay a ransom than to pay IT to beat the encryption.

The Internet of Things (IoT), or the inter-networking of smart devices, also facilitates the spread of ransomware, because the processing capabilities of connected TVs, cameras, and other devices can be leveraged to “aid” in an attack. In a stunning demonstration of these devices’ vulnerability, The Atlantic built a fake web toaster only to have it hacked within the hour.

How can you protect against ransomware?
Your company should have a firewall that is up-to-date with the latest security patches. Make sure you also have robust data recovery capability—ideally, you can simply restore your own data without needing to pay a ransom. Trends toward cloud-based services are also promising, since those services are typically isolated from malicious emails and downloads.

Additionally, train your staff in security and disaster response. Test response procedures with tabletop simulations or virtual exercises. Your successful recovery is more likely with a practiced plan in place.

The number of ransomware attacks is increasing with new variants popping up daily, so protecting your digital infrastructure is not optional. If you need help securing your tech environment or building a response and recovery plan, click here to sign up for a free IT assessment today.

Thursday, June 23, 2016

Avoiding Threats in the Cloud

The cloud’s potential for storage and service options has created countless opportunities for businesses to expand or improve their offerings, without requiring costly changes to local networks. But, the cloud is not perfect, and it poses some security challenges.

Cloud-based applications can be very convenient, especially for accessing or sharing information when working remotely. However, precautions must be taken to protect sensitive information.

Here are a few steps you can take to protect your cloud assets:

Educate the masses. Cloud services are often adopted at the top levels of a business or within specific workgroups, without consulting individual department managers or IT staff. But, it’s critical that end-users understand how to safely use cloud applications before they are adopted to avoid any potential threats. Proper employee training and frequent email reminders regarding secure use of cloud-based applications or files helps to ensure the safety and security of your network and your business.

Know your cloud use. Many companies are unaware of the cloud services their employees are using. According to cloud security firm Netskope, 90 percent of all cloud applications are not sanctioned by IT. This opens the door for data breaches, data loss, and account hijacking—which, are generally regarded as the top three threats to cloud computing. Organizations and employees should be aware that simple Internet registration systems, phishing, and fraud schemes can allow a hacker to take control of your account. Thankfully, keeping firewalls updated and teaching employees about best practices regarding cloud usage can easily prevent most of these threats.

Protect your files, wherever they are. You can lock down access on mobile devices, but this won’t protect your information if it’s synced to the cloud. Instead, focus on protecting the files themselves with consistent security encryption policies to ensure control. You decide who can view, modify, or print your files, whether they are on a laptop, mobile device, or desktop computer.

As hackers continue to experiment with new ways to attack, it's important for all businesses to mitigate the risks associated with cloud computing by educating stakeholders, investing in data protection, and using encryption safeguards when possible. Cloud security is serious business, so make sure you take the time to get it right.

Contact us today at info@momnet.com to learn about cloud-based applications that can help grow your business, and the security solutions that can keep them secure.