Cyber Security Posts- Ransomware

What is Ransomware and Why Should You Care?

Cyber Security Posts- Ransomware What is Ransomware and Why Should You Care?

Ransomware is without doubt one of the biggest threats facing home computer users in years. Unlike many online attacks, it isn’t primarily out to steal your bank details or spy on you. Instead, it wants to scare you into handing over money to the attacker at the other end of the internet. How does it do this? By locking you out of your machine or folders unless a ransom is paid. Failure to do so could result in you being locked out forever.

But help is at hand. At Trend Micro we’ve been protecting our customers for nearly 30 years now, and we’ve leveraged that experience to put together a few simple steps users can take to reduce the chances of getting infected:

How does it work?

There are two main types of ransomware:

  1. ‘Lock screen’ ransomware is an older, less common type which locks a user’s screen, often flashing up messages spoofed to appear as if they’ve come from the police. The idea is to scare the victim into paying up.
  2. Crypto-ransomware is by far the most common and destructive type. Once it finds its way onto your machine it will encrypt all or most of the data on your hard drive based on file type. This means you won’t be able to make sense of any of it. The attacker will demand a ransom – usually a few hundred dollars – be paid in Bitcoin in return for the all-important decryption key, so you can access and read that data again.

Unfortunately, ransomware is everywhere, meaning there are multiple ways to get infected. It could arrive as a spam email, perhaps in a malicious link or attachment. Users can also get hit merely by visiting a legitimate website which has been previously infected, or a site containing malicious adverts. It means users must remain alert, have the right security tools in place and keep all software up-to-date to stay safe.

How common is ransomware?

That’s hard to say because many cases go unreported. In fact, the FBI released an alert in September urging victims to report attacks so it could “gain a more comprehensive view of the current threat and its impact on US victims.” That alert claimed just one type of ransomware infected an estimated 100,000 computers per day. To put that in perspective, I want to start saying that I'm very very proud to work in the Cyber Security space and all the more proud to work for a product company like Trend Micro. The invest in people, R&D and Engineering the three key pillars that are missing in today's Corporate America. The goal for this post is not to market but to educate - period.

Trend Micro alone spotted 79 new ransomware families in the first half of this year – a 179% increase on the whole of 2015.

The key advice here is: DO NOT PAY UP. The bad guys behind these schemes will keep on attacking as long as there is money to be made. Plus, there’s no guarantee you’ll get your data back. A recent Trend Micro UK poll, for example, found 1 in 5 companies paid up but never got their data back.

How can I protect myself?

The effects of ransomware can be devastating for home PC users. But that doesn’t mean it’s impossible to defend against. The key here is to take preventative measures to stop that initial infection.

The following will help to keep you safe:

  • Prevent future attacks with Trend Micro™ Maximum Security.
  • Avoid opening unverified emails or clicking on their embedded links, which can start the ransomware installation process.
  • Back up your important files using the 3-2-1 rule: create three backup copies on two different media, with one of the backups in a separate location.
  • Regularly update software, programs, and applications, to ensure your apps are current, with the latest protections against new vulnerabilities.

If you suspect you have ransomware on your computer or mobile device, feel free to in mail me or reach out to sunil_krishnan@trendmicro.com, cell 201-289-3004

K. H. GOKULA Krishnan

Manager Operations-Hedge Funds Investment Banking- Fund Accounting/Fixed Income

8y

informative & recommended to all

Like
Reply

To view or add a comment, sign in

More articles by Sunil(Sunny) Krishnan

  • IIOT in the "OEM" (Original Equipment Manufacturer) world

    IIOT in the "OEM" (Original Equipment Manufacturer) world

    OEM & IIOT Opportunities This note is from a recent MIA(Manufacturing In America)event at Detroit 2019. Barry-Wehmiller…

    2 Comments
  • New Year, New Security Challenges: What to Expect from 2017

    New Year, New Security Challenges: What to Expect from 2017

    Happy New Year !!!! Leveraging Our 1,200-strong team of threat researchers and engineers who work round the clock and…

  • December month Security Update

    December month Security Update

    As I kick start my day , one of the coldest days, I feel Thankful and blessed to have surrounded by some of the…

  • 8 SECURITY PREDICTIONS FOR 2017

    8 SECURITY PREDICTIONS FOR 2017

    I'm privileged to have the help from my FTRE(Forward-Looking Threat Research Engineering) Team to understand the…

    3 Comments
  • This Week in Security News

    This Week in Security News

    Welcome to a quick weekly roundup on Security, where I wish to share what you need to know about the cybersecurity news…

    1 Comment
  • 4 Ways 2 Protect Your Kids from Cybercriminals

    4 Ways 2 Protect Your Kids from Cybercriminals

    My 12 year old son and 8 year old daughter are on devices in the free time . I guess it is that generation !!! They are…

    1 Comment

Insights from the community

Explore topics