The latest WannaCrypt Ransomware attack has a few people worried, but don’t be. Take a look at these 5 steps to ensure you remain protected now and in the future:
Update Your Software
The IT industry now belives that the ransomware called WannaCrypt, may have initially infected machines by getting people to download it through an email. What is most alarming about the attack is that there were numerous fixes available (long before the attack happened) which could have been applied with a simple update. If everyone had ensured they were running the latest updated operating systems (for example the latest Windows 10), then such attack would not have had such disruption. We would recommend that you ensure your Windows devices are set to automatically install updates. Of course those wondering why the NHS didn’t apply this principle should remember that the NHS is a large organisation and in doing updates in certain areas of the business could have resulted in services being taken offline (especially true with legacy systems), so it’s a lot more complicated than just running a Windows Update across the enterprise, however, this is why they were affected.
Install Antivirus Software
As well as keeping your computer operating system up to date, you should also ensure you have anti virus software installed preferably with anti malware and spyware included. The latest antivirus software can prevent malware from infecting your computer. Just like updating your operating system, the same principles apply so you need to ensure that you keep your anti virus up to date so that it blocks the latest threats. We recommend Kaspersky Lab, Bitdefender or Webroot Internet Security.
Ensure You Have Back-Ups
In the worst case scenario that you do fall victim to an attack, you can rescue yourself quickly as long as you have backups in place or are operating from the cloud such as with our software solutions. Although your device might be locked down, you will still be able to operate safe in the knowledge that it’s really just a minor invoncenience at best. And you should DEFINITELY NOT pay the ransom fee! If you would like to know more about your options relating to this please contact us.
Be Extra Wary of Suspicious Emails and Pop-Ups
It is believed that the initial ransomware started via an email link. But how do you spot a dodgy looking email? Check out our Free Guide Here but also look carefully at the email address of the sender to see if it is coming from a legitimate address. You should also notice it will have blatant typos and grammatical errors in the body. Before you click any links, if you hover over hyperlinks you will see whether they direct you to suspicious web pages. If an email appears to have come from your bank, credit card company or internet service provider, keep in mind that they will never ask for sensitive information like your password or social security number. Ransom developers often use pop-up windows that advertise software products that remove malware. Do not click on anything through these pop-ups, just close the Window, or shut down your browser session fast.
What Should I Do if I Get Infected?
If you are already a victim the very first thing to do is disconnect your computer from the internet so it does not infect other machines. You should then report the crime the crime and seek help from a technology professional who specialises in data recovery.