06/14/2020 – Looking for another social networking site that doesn’t track and collect your information for use by advertisers? Tired of FB getting hacked and finding out about it weeks to months laters? Tired of people spoofing your account? Try https://mewe.com
This is a site that respects your privacy!
06-14-2020 – How to Set Up Your Devices for Privacy Protection
06/14/2020 – Protect your privacy in 2020 in 5 simple steps
06/09/2020 – DEVICE SECURITY
Not fluent in C++? Don’t know how to code in Ruby? You can still be a cyber-security force to be reckoned with. Here are few special powers in your arsenal. By activating them you can fight hackers without having to be a computer-whiz.
06/09/2020 – DocuSign phishing emails: 4 signs of an attack, and how to protect yourself
06/09/2020 – Life After Coronavirus Lockdowns: 5 Tips To Help Boost Your Cyber Safety
05/28/2020 – A link to the Duck-Duck-Go article on why “I have nothing to hide” is a poor reason for not proactively protecting your privacy.
7 tips to prevent ransomware
Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it. Ransomware, as it is known, scores high profile victims like hospitals, public schools and police departments. Now it has found its way into home computers.
The nefarious ransomware business model has turned out to be a lucrative industry for criminals. Over the years its ill repute has made law enforcement team up with international agencies to identify and bring down scam operators.
Most of the ransomware attacks that have taken place in the past have been linked to poor protection practices by employees.
There are a few dos and don’ts when it comes to ransomware.
1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
2. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data. If you don’t have a backup of your precious files (mostly photos), start backing up!
3. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick users (if you’re reading this, you are a user) into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
5. Do employ content scanning and filtering on your mail servers. Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.
6. Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
7. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton WiFi Privacy.
Ransomware criminals often attack small and medium sized businesses. Among other cyber attacks, ransomware is one criminal activity that can be easily worked around with the above-mentioned solutions. Norton Security Premium coupled with education about these threats is an excellent protection plan for today’s cyber landscape.
This article courtesy of Norton (Symantec) with some editing by me. Author not cited.
Page last updated: 06/14/2020
Page created: 07/12/17