Jlhoffman Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 16 April 2013

Ransomeware Now #1 MalwareThreat - Learn More Here

Posted on 13:02 by Unknown
I just read an outstanding white paper from a couple of researchers at Sophos Security outlining how Ransomware is passing up FakeAlert malware as the biggest and most serious threat to users of the Internet.  This reinforces our experience in the field.

Ransomware differs from other malware in that it attempts to extort a payment from the infected user by either doing or threatening to do something malicious to their computer (or network) like encrypting all of their files or locking it up.  Most times, even when the ransom is paid, the files never get un-encrypted leaving a disaster behind.  The encryption levels can be sophisticated enough that even advance decryption software can't unscramble the mess. 

Ramsonware can be delivered either by an infected web site or via e-mail.  At last count the number of infected legitimate web sites sat at over 28 million according to some experts. 

There are several ways to reduce your risk of infection: 
  • First and foremost, computer users have to do a better job of keeping all their programs, their browsers, their operating systems (whether it be Windows, MAC OS, Linux or Android) and their support apps like Java, Acrobat, FlashPlayer etc up to date. 
  • Second, keep your A/V programs updating in real-time and set to do Heuristic scanning if it has that capability.  Throw away those "free" A/V programs if your using one of them and buy a real A/V program from one of the top 5 A/V companies.  (Trend Micro, McAfee, Symantec, Kaspersky or Sophos) We also like Viper.
  • Add, off-site e-mail spam scrubbing to your e-mail domain.  It's better to screen your incoming e-mail for problems before it arrives on your computer or network to reduce exposure. 
  • Finally, you should consider adding a perimeter anti-malware component to your network protection strategy.  This reduces the risk of malware from ever getting into your network in the first place and greatly reduces your risk of infection.
No single solution wil be 100% effective.  The malware writers will always find a vulnerability to exploit in time but if you're to stay ahead of them enough to greatly reduce your exposure you need to create a blended approach to security. 

There are also additional steps that can be taken to mitigate the problems caused by all kinds of malware including having a real-time backup solution that improves your ability to recover from an infection. 

Don't forget to secure your portable devices, too! Experts agree that there are vastly more security holes on portables that PCs because so many apps are so poorly written and are full of holes. Lock down your smartphones, tablets and other portables too.

If you're not treating malware as an ever-present real threat to your network, it's inevitable that you're going to get hit.  The only real questions then are "How hard?" and "Will you be able to recover?"

For additional help, you can contact us anytime at ACT Network Solutions at (847) 639-7000.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Ransomeware Now #1 MalwareThreat - Learn More Here
    I just read an outstanding white paper from a couple of researchers at Sophos Security outlining how Ransomware is passing up FakeAlert malw...
  • Computer Support Rates - When Cheap Really Isn't
    What's in a labor rate?  Why are some IT companies more expensive than others?  Our company is neither the most expensive in our market ...
  • Server Configuration - Heaven Save Us From Well-Meaning Amateurs!
    How do I tell the client what their old tech did to them?  They've got to spend a bunch of money to correct the mess he made and I'm...
  • When It's Time To Fire A Customer
    What?  Isn't that backwards?  Isn't it the customer that usually does the firing? Usually, as business people, we work so hard to fi...
  • Using Personal Computers In the Workplace
    At ACT, we support a great many organizations that allow employees to use their own computers at work.  Sadly, I've noticed that some of...
  • What to do with Windows XP
    Well, it had a good long run.  Windows XP is now 13 years old.  In less than 10 months Microsoft is pulling the plug on our old friend XP.  ...
  • Wireless Networking Is Due For A Big Jump In Performance
    Just when we were getting comfortable with the 802.11n wireless standard, here comes a newer and better wireless solution - 802.11ac.  It wi...
  • Documentation - The Key To Client Support Success
    Recently, we won the trust of a new client that was unhappy with the service provided by their previous IT company.  After the client notifi...
  • Going to the Cloud is easy, getting out is a lot tougher!
    Everyone is pushing you to take your business to the cloud, right?  It's easy, right?  The sales rep used all the right words in his pit...
  • Support for Windows XP and Office 2003 stops on April 8th.
    All Microsoft support for Windows XP and Office 2003 stops on April 8th. What are the risks to your business if you don't upgrade? Let...

Blog Archive

  • ▼  2013 (39)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (4)
    • ►  July (3)
    • ►  June (9)
    • ►  May (3)
    • ▼  April (3)
      • Lax Network Security is a BIG Problem in Business ...
      • Ransomeware Now #1 MalwareThreat - Learn More Here
      • How Fast Can You Get Your Data Back From The Cloud?
    • ►  March (6)
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (2)
    • ►  November (8)
    • ►  October (2)
Powered by Blogger.

About Me

Unknown
View my complete profile