Menu
360 ICT
  • Home
  • Testimonials
  • Services
    • Contact Tracing
    • Premium User Support
    • Working From Home
    • IT Support
    • Managed ICT Services
    • Cyber Security Services
    • Hosted Telephony Services
    • Clean Power
  • About
  • Blog
  • Contact
  • 0203 759 5052
Close Menu
October 26, 2017

RANSOMWARE – GUIDANCE FOR SMALL & MEDIUM BUSINESSES

Ransomware is on the rise – there are now more than 50 families of this malware in circulation — and it’s evolving quickly. With each new variant comes better encryption and new features. This is not something you can ignore!

Contentshide
1Ransomware is on the rise – there are now more than 50 families of this malware in circulation — and it’s evolving quickly. With each new variant comes better encryption and new features. This is not something you can ignore!
1.1Encryption Ransomware (Malware)
1.2What is WannaCry?
1.2.1What can I do to protect myself?
1.2.1.11. Update Windows
1.2.1.22. Run antivirus
1.2.1.33. Keep a safe backup of your important files
1.2.2What to do if you have been infected with ransomware
1.3Files encrypted by the WannaCry attack have no way of being decrypted by anyone other than the attacker. Don’t waste your time or money on services that are promising to do it.
1.4Please do follow the 360ict advice and if you need any further assistance or Managed Support please Contact Us on 0208 663 4000

At 360ict we offer our clients full Managed IT Support and have had several instances recently with regard to the ever increasing and evolving problems of RANSOMWARE.

So What is RANSOMWARE ?

 

A ransomware attack is typically delivered via an e-mail attachment which could be an executable file, an archive or an image. Once the attachment is opened, the malware is released into the user’s system. Cybercriminals can also plant the malware on websites. When a user visits the site unknowingly, the malware is released into the system.

The infection is not immediately apparent to the user. The malware operates silently in the background until the system or data-locking mechanism is deployed. Then a dialogue box appears that tells the user the data has been locked and demands a ransom to unlock it again. By then it is too late to save the data through any security measures.

Encryption Ransomware (Malware)

It encrypts personal files and folders (documents, spread sheets, pictures, and videos).

The affected files are deleted once they have been encrypted, and users generally encounter a text file with instructions for payment in the same folder as the now-inaccessible files.

You may discover the problem only when you attempt to open one of these files.

Some, but not all types of encryption software show a ‘lock screen’
Generally the Cyber Criminals will demand payment by CryptoCurrency, specifically
 BitCoin

UK Government & Private partners are working with businesses and organsiations affected by the ransomware, including the most prevalent known as ‘WannaCry’.

What is WannaCry?

WannaCry is a type of malicious software known as  ransomware.  Ransomware makes your data or systems unusable until the victim makes a payment.

What can I do to protect myself?

There are three main things you should do to protect yourself.

1. Update Windows

WannaCry only affects computers running Microsoft Windows operating systems that don’t have the latest security patches installed. If you are using a recent version of Windows (Windows 7, Windows 8, Windows 8.1 or Windows 10)  and have automatic updates turned on, you should already be protected automatically against WannaCry.

To update your version of Windows:

  • If you are using a currently supported version (Windows 7, Windows 8, Windows 8.1 or Windows 10), run  Windows Update  and apply any updates.
  • If you are using Windows XP, Windows Vista or older versions of Windows,  download the WannaCry security update from here   and install it.

Note:  360ict  strongly recommend that you do not continue to use unsupported operating systems, but instead upgrade to one which receives regular security updates from the vendor.

2. Run antivirus

  • Make sure your antivirus product is turned on and up to date. Windows has a built in malware protection tool ( Microsoft Defender ) which is suitable for this purpose.
  • Run a full scan to make sure your computer is currently free of all known malware.

3. Keep a safe backup of your important files

  • Regularly create a backup copy of your important files (such as photos, documents, and other files that can’t be replaced). If you have backups of files that you can recover, you can’t be blackmailed.
  • Make sure that this copy is  kept separate from your computer. If it’s on a USB stick, or a hard drive, or on any type of removable media, do  not leave it connected (or  anywhere on your network) or it may also be attacked by ransomware.
  • You should consider using cloud services to back up your files. Many cloud service providers (for example, email providers) offer an amount of cloud storage space for free.
  • See 360ict Blog on BACK UP’S

What to do if you have been infected with ransomware

The National Crime Agency (NCA) encourages anyone who thinks they may have been subject to online fraud to contact Action Fraud.

If as a small business you have been a victim of ransomware and are worried about the infection spreading to other parts of your network, these steps may help guide your actions:

  • Immediately disconnect you computer, laptop or tablet from network. Turn off your Wi-Fi.
  • Safely format or replace your disk drives.
  • Whilst you’re still disconnected from your network, directly connect this computer to the Internet.
  • Install and update the operating system and all other software.
  • Install, update, and run antivirus software.
  • Reconnect to your network.
  • Monitor network traffic and/or run antivirus scans to identify if any infection remains.

Files encrypted by the WannaCry attack have no way of being decrypted by anyone other than the attacker. Don’t waste your time or money on services that are promising to do it.

Should I pay the ransom?

The NCA  encourages industry and the public  not to pay the ransom. If you do:

  • There is no guarantee that you will get access to your data.
  • Your computer will still be infected unless you complete extensive clean-up activities.
  • You will be paying criminal groups.

 Please do follow the 360ict advice and if you need any further assistance or Managed Support please Contact Us on 0208 663 4000

The Importance Of Backups For SMEs Cyber Essentials – Protecting The Security Of Your Business

Related Posts

Proximity & Contact Tracing for small businesses and organisations

Uncategorised

Proximity & Contact Tracing for small businesses and organisations

Top remote working digital tools to get your business on track

Uncategorised

Top remote working digital tools to get your business on track

Covid-19 Business Challenges: from Cybercrime to Remote Technology

Uncategorised

Covid-19 Business Challenges: from Cybercrime to Remote Technology

    Contact Us

    Bromley, Croydon & South London office
    (Sales & Technical).

    Provident House
    6-20 Burrell Row
    Beckenham
    Kent
    BR3 1AT

    Telephone: 0203 759 5052
    Fax: 0208 650 3627

    Quick Links

    Testimonials
    Areas Served

    -

    Central London Office

    Nova South
    9th Floor
    160 Victoria Street
    London
    SW1E 5LB

    Telephone: 0203 759 5052
    Fax: 0208 650 3627

    360ict Youtube Channel360ict Linkedin Profile360ict on Twitter360ict on Facebook
    © 2020 360ict Ltd, 160 Victoria Street, Westminster, London SW1E 5LB, UK Tel: 0203 759 5052
    Powered by WordPress • Themify WordPress Themes

    Complete IT infrastructure cover, with instant user support and remote installations. Get 50% off our Premium Support Service until the end of March 2021

    Contact us Now!