From the BlogSubscribe Now

Avoiding Ransomware

As we said last summer: “It’s troubling that we live in a world where words like “ransomware” exist”. Troubling … but not surprising that these attacks are still an ongoing issue and increasing!

Imagine suddenly losing access to that important sales proposal due tomorrow. Or that complicated spreadsheet with rows and columns filled with numbers, formulas, rules, etc. Or the client presentation you’ve been working on for weeks. Now imagine this happening across all your files, and your co-workers files … and don’t forget losing your accounting, CRM and HR data too!

Now imagine having to pay to get it back. If you want to learn more about ransomware, check out our New Reality post from late 2013.

What should you do?

There are a few easy-to-follow recommendations that will help you, and your organization, avoid threats like ransomware.

  • Don’t open email attachments from an unknown source. Ever. Especially anything with .ZIP attachments. We can’t emphasize this enough.
  • Back-up your files religiously. End users should back up business data to your organization’s shared folders. Data on user devices can be permanently lost in the event of an attack or infection.
  • Make sure you have a back-up plan that includes a scheduled and offsite data storage. Assess your strategy to make sure it can help protect your data against these attacks.
  • Have up-to-date security software. Make sure your client and network security files are as recent as possible.
  • Report suspicious email to your technical experts and partners so they can advise and act accordingly.

Anyone availing of Triware’s managed Envision IT support service can feel assured we are consistently working with our industry partners, to keep ahead of these threats, and make sure you’re as safe as possible. Others who have questions should connect with us to make sure you’re protected.

At minimum, review guidelines listed above and ask the important questions about your data security and current strategy.