{"id":2301,"date":"2017-05-15T10:49:54","date_gmt":"2017-05-15T14:49:54","guid":{"rendered":"http:\/\/www.paageetcie.com\/blog\/?p=2301"},"modified":"2020-04-04T23:26:08","modified_gmt":"2020-04-05T03:26:08","slug":"ransomware-attack","status":"publish","type":"post","link":"http:\/\/www.paageetcie.com\/blog\/ransomware-attack\/","title":{"rendered":"Ransomware Attack: 10 Tips to Prevent Cyber Thieves from Successfully Phishing Your Email and Accessing Your Computer"},"content":{"rendered":"<p>Imagine everything unexpectedly freezes on your computer. You can\u2019t even open your Internet browser. Suddenly, a message pops up on your screen. It says you have 12 hours to pay a fine of thousands of dollars or your important data, documents, photos and videos will be gone. This intrusion is known as a ransomware attack.<\/p>\n<p>That\u2019s likely what happened during last week\u2019s massive cyber attack. According to the <a href=\"http:\/\/www.bbc.com\/news\/technology-39913630\">BBC<\/a>, more than 200,000 victims in 150 countries, including businesses and individuals, were affected.<\/p>\n<p>Unfortunately, the cybercriminals demanding the ransom are usually the only ones with the encryption key required to get your data back. Without the key, your files cannot be recovered, resulting in a complete loss of everything stored on your computer. Worse yet, you pay the ransom and still don\u2019t get the key to your files, so now you\u2019re out $$ <em>and<\/em> all of your valuable data.<\/p>\n<p>A ransomware attack is scary stuff. But there are ways to minimalize the chances of a ransomware attack happening on your computers, whether at home or in your business. Follow the preventative measures listed below to reduce the chance of an attack and to help keep your data secure.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Download and Install the Microsoft Patch<img loading=\"lazy\" class=\"alignright size-medium wp-image-2307\" src=\"http:\/\/www.paageetcie.com\/blog\/\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-11.58.15-AM-279x300.png\" alt=\"\" width=\"279\" height=\"300\" srcset=\"http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-11.58.15-AM-279x300.png 279w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-11.58.15-AM-768x827.png 768w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-11.58.15-AM.png 857w\" sizes=\"(max-width: 279px) 100vw, 279px\" \/><\/strong><\/p>\n<p>If you still use an older version of Microsoft Windows, read the company\u2019s latest <a href=\"https:\/\/blogs.technet.microsoft.com\/msrc\/2017\/05\/12\/customer-guidance-for-wannacrypt-attacks\/\">blog post<\/a> to better understand if your PC is vulnerable to a ransomware attack. Then, <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx\">download the patch<\/a> to update your system\u2019s security.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Install Malware Detection Software<\/strong><\/p>\n<p>On personal computers, install <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2469309,00.asp\">antivirus software<\/a>, such as <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2469309,00.asp\">McAfee AntiVirus<\/a>, <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2424097,00.asp\">Norton by Symantec<\/a> or <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2460688,00.asp\">Bitdefender Antivirus Plus<\/a>, to identify and help prevent malware. For the ultimate protection, install real-time scanning software, such as that offered by <a href=\"https:\/\/www.microsoft.com\/security\/scanner\/en-us\/default.aspx\">Microsoft<\/a> or <a href=\"https:\/\/help.comodo.com\/topic-72-1-284-3011-.html\">Comodo<\/a>, to work constantly in the background, checking for malware every time you interact with a file.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Research Patches and Updates Before Installing<\/strong><\/p>\n<p>Always keep software and apps updated to take advantage of the latest security features. Before you install an update for an app, software program, <strong><img loading=\"lazy\" class=\"alignright wp-image-2306 size-medium\" src=\"http:\/\/www.paageetcie.com\/blog\/\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-11.43.00-AM-235x300.png\" alt=\"Use anti-virus software to help prevent a ransomware attack.\" width=\"235\" height=\"300\" srcset=\"http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-11.43.00-AM-235x300.png 235w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-11.43.00-AM.png 244w\" sizes=\"(max-width: 235px) 100vw, 235px\" \/><\/strong>operating system or an Internet browser, check first for news that updates have been made available. If one is available, go directly to the company\u2019s website to download the update. Never use links in emails or in ads to get the update. These could be phishing attempts to get you to download malware.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Watch for Phishing Attempts<\/strong><\/p>\n<p>Cyber criminals want you to click on false links in email messages so they can access your login information. For instance, the recent hacking attempt on the email account of John Podesta, Hillary Clinton\u2019s campaign chairman, is a case in point. The phishing email the staff received requesting Podesta change his password looked legitimate. But a closer look at the sender\u2019s address was the clue everyone missed; in reality, the email was a clever phishing scheme. Rather than click links in emails \u2013\u00a0even those from utility and financial companies \u2013\u00a0always type the website address directly into your browser to make changes to your account. Read our blog post, <a href=\"http:\/\/www.paageetcie.com\/blog\/\/10-signs-target-email-phishing-scam\/\">10 Signs You Are the Target of an Email Phishing Scam<\/a> for more info.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Don\u2019t Open Unexpected Attachments<\/strong><\/p>\n<p>Never click on links or open attachments in emails you are not expecting. SPAM emails are one of the most common ways cybercriminals get access to your computer. Once you click the link or open the attachment, your computer could become infected, making it easier for attackers to install their vicious malware.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Back Up Files Regularly<\/strong><\/p>\n<p><strong><img loading=\"lazy\" class=\"alignright wp-image-2304 size-medium\" src=\"http:\/\/www.paageetcie.com\/blog\/\/wp-content\/uploads\/2017\/05\/AdobeStock_88829865-300x200.jpeg\" alt=\"Back up your data to limit the effects of a ransomware attack.\" width=\"300\" height=\"200\" srcset=\"http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/AdobeStock_88829865-300x200.jpeg 300w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/AdobeStock_88829865-768x513.jpeg 768w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/AdobeStock_88829865-1024x683.jpeg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/strong><\/p>\n<p>Valuable, sensitive or confidential files need to be backed up on a regular schedule. Back up files to the<\/p>\n<p>&nbsp;<\/p>\n<p>cloud or an external storage device. If your computer is infected with malware, you\u2019ll be able to recover the data from your last backup.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Disconnect Backup Devices<br \/>\n<\/strong>If you back up your files to an external hard drive, disconnect the drive from your computer as soon as the backup is complete. Otherwise, cybercriminals can access the drive through your computer. According to Microsoft, attackers hold the external drives hostage in order to increase your motivation to pay the ransom.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Use Strong Passwords<img loading=\"lazy\" class=\"alignright size-medium wp-image-2305\" src=\"http:\/\/www.paageetcie.com\/blog\/\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-11-at-7.41.03-AM-1-300x203.png\" alt=\"\" width=\"300\" height=\"203\" srcset=\"http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-11-at-7.41.03-AM-1-300x203.png 300w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-11-at-7.41.03-AM-1-768x520.png 768w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-11-at-7.41.03-AM-1.png 1009w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/strong><\/p>\n<p>Create unique passwords for each online account to keep cybercriminals from gaining access. Use a password manager to simplify the task. Password managers are available via software, Internet browsers, or use our <a href=\"http:\/\/www.paageetcie.com\/blog\/\/using-a-password-manager\/\">free fillable Desktop Password Manager<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Protect Mobile Devices<\/strong><\/p>\n<div id=\"attachment_2303\" style=\"width: 310px\" class=\"wp-caption alignright\"><img aria-describedby=\"caption-attachment-2303\" loading=\"lazy\" class=\"size-medium wp-image-2303\" src=\"http:\/\/www.paageetcie.com\/blog\/\/wp-content\/uploads\/2017\/05\/AdobeStock_66448460-300x188.jpeg\" alt=\"\" width=\"300\" height=\"188\" srcset=\"http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/AdobeStock_66448460-300x188.jpeg 300w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/AdobeStock_66448460-768x480.jpeg 768w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/AdobeStock_66448460-1024x640.jpeg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-2303\" class=\"wp-caption-text\">mobile target<\/p><\/div>\n<p>Some ransomware schemes involve mobile devices. Attackers use geo-targeting to gain access to personal details about their victims, such as location, where they work and other activities. The attackers then use this information and language that sounds legitimate to get you to download an update that contains malware. Before installing security patches or updates, research and verify that the update is legitimate.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Be Wary When Browsing the Web<img loading=\"lazy\" class=\"alignright size-medium wp-image-2308\" src=\"http:\/\/www.paageetcie.com\/blog\/\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-12.01.54-PM-300x231.png\" alt=\"\" width=\"300\" height=\"231\" srcset=\"http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-12.01.54-PM-300x231.png 300w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-12.01.54-PM-768x591.png 768w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-12.01.54-PM-317x243.png 317w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-12.01.54-PM-360x276.png 360w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/05\/Screen-Shot-2017-05-14-at-12.01.54-PM.png 821w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/strong><\/p>\n<p>Ransomware has become more sophisticated lately, with attackers using social media networks and online advertisements to gain access to victims\u2019 computers. To stay safe, <a href=\"http:\/\/www.paageetcie.com\/blog\/\/how-to-disable-internet-browser-cookies\/\">disable Internet browser cookies<\/a> that track your every move. Consider <a href=\"http:\/\/www.paageetcie.com\/blog\/\/1603-2\/\">switching to a browser<\/a> that doesn\u2019t follow you around the web, such as DuckDucGo.com. Limit the amount of information used to customize the ads that pop up on your screen. For instance, if you have a Google account, <a href=\"http:\/\/www.paageetcie.com\/blog\/\/restrict-info-on-google\/\">see our blog post<\/a> about taking steps to change your Google privacy settings.<\/p>\n<p>For more tech tips and tools essential to simplifying and organizing your everyday life, send an email with your name and email address to <a href=\"mailto:hello@paageetcie.com\">hello@paageetcie.com<\/a>, and we\u2019ll add you to our enewsletter list.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine everything unexpectedly freezes on your computer. You can\u2019t even open your Internet browser. Suddenly, a message pops up on your screen. It says you have 12 hours to pay a fine of thousands of dollars or your important data, documents, photos and videos will be gone. This intrusion is known as a ransomware attack. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2302,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,245,269,51,163,164,274],"tags":[310,307,308,225,306,309,305],"_links":{"self":[{"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/posts\/2301"}],"collection":[{"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/comments?post=2301"}],"version-history":[{"count":4,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/posts\/2301\/revisions"}],"predecessor-version":[{"id":2311,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/posts\/2301\/revisions\/2311"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/media\/2302"}],"wp:attachment":[{"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/media?parent=2301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/categories?post=2301"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/tags?post=2301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}