Reader Advisory

Some articles posted in The SlickMaster's Files may contain themes, languages, and content which may neither appropriate nor appealing to certain readers. READER DISCRETION is advised.

Sunday, July 05, 2020

Newsletter: Tips for SMBs: What to do Before, During, and After a Ransomware Attack?

07/01/2020 01:54:14 PM

Author's Note: If you're a business owner, what can you do when a Ransomware has struck an attack on you?

Kasperksy has advised small business owners in Southeast Asia a handful number of recommendations and advises on how they can spare themselves from the perils of this damaging cyberattack. And the global cybersecurity company means tips on beforehand, as it happens, and the aftermath

All that and more in this press release below: check them out.

*****


Over three years after the infamous Wannacry ransomware, its costly aftermath still remains a vivid glimpse of the damage cybercriminals can do by kidnapping companies’ essential data. This threat is undoubtedly present as just this month, operations of an automobile giant were halted in several parts of the world after a successful attack by another ransomware dubbed as SNAKE (also known as EKANS).

Kaspersky’s latest statistics for small and medium businesses (SMBs) in Southeast Asia (SEA) show the same story. In the first three months of the year, the global cybersecurity company’s solutions have blocked a total of 269,204 ransomware attempts against businesses in the region with a total of 20-250 employees.

“Globally, we can say that ransomware has reached its peak years ago. It has gradually decreased in number, however, it is fast becoming business-centric. Based on our latest research, one-in-three ransomware attacks are now targeting business users. So while the total number of ransomware attempts detected in the region is 69% lower compared with the same period last year, the risks of SMBs and enterprises losing their data and their cash because of this threat is still ever-present. The good news is that there are effective ways to protect SMB’s much-needed cash flow from becoming  payment to get their kidnapped data back,” says Yeo Siang Tiong, general manager for Southeast Asia at Kaspersky.

As more economies in Southeast Asia re-open after different forms of lockdown, Kaspersky’s experts have several important and useful tips for restarting business safe from the ransomware threat.

BEFORE A RANSOMWARE ATTACK
  • Back-up, back-up, back-up Always have fresh back-up copies of your files so you can replace them in case they are lost (e.g. due to malware or a broken device) and store them not only on the physical object but also in cloud storage for greater reliability. Make sure you can quickly access them in an emergency when needed.
  • Educate your employeesBuild a shared sense of responsibility inside your company. Explain to your employees how following simple rules can help a company avoid ransomware incidents. Create employee and operational control policies that cover aspects of network management and facilities, including password renewal regulations, incident handling, access control rules, protecting sensitive data and more.
  • Layered security in everythingLiterally everything. Security means safeguarding all data touchpoints within your network, may it be via hardware devices or software platforms.
  • Update, update, update
  • It is essential to install all security updates as soon as they become available. Always update your operating system and software to eliminate recent vulnerabilities.
  • Use a ransomware tool
    SMBs can also try a free Kaspersky Anti-Ransomware Tool for Business. Its recently updated version contains an exploit prevention feature to prevent ransomware and other threats from exploiting vulnerabilities in software and applications. It is also helpful for customers that use Windows 7: with the end of support of Windows 7, new vulnerabilities in this system won’t be patched by the developer.


DURING and AFTER A RANSOMWARE ATTACK
  • Unblock your computer; remove the malware
    If you find your computer blocked — it won’t load the operating system — use Kaspersky WindowsUnlocker, a free utility that can remove a blocker and get Windows to boot.

    Cryptors are a harder nut to crack. First, you need to get rid of the malware by running an antivirus scan. If you don’t have a proper antivirus on your computer, you can download a free trial version here.
  • Don't pay, do report
    Remember that ransomware is a criminal offense. Do not pay the amount the perpetrators is asking in exchange for your data. If you become a victim, report it to your local law enforcement agency.
  • Get your files back; look for a decryptor
    If you have a backup copy of your files, you can simply restore your files from the backup. That is by far your best shot. If you haven’t made backups, you can try to decrypt files by using special utilities called decryptors. All of the free decryptors created by Kaspersky can be found at Noransom.kaspersky.com.

    Other antivirus companies also develop decryptors. One thing: Be very sure you’re downloading these programs from a reputable website; otherwise you run a high risk of getting infected by some other malware.
  • Involve the experts
    If the decryptor is not available online, contact your trusted cybersecurity vendor to check if they have a decryption tool for the ransomware that has attacked you. 


Author: slickmaster | © 2020 The SlickMaster's Files

No comments:

Post a Comment

Feel free to make a comment as long as it is within the bounds of the issue, and as long as you do it with decency. Thanks!