You may think that it couldn’t happen to you, but security incidents involving ransomware have happened more frequently year over year; and according to the Cyber Threat Alliance, about two-thirds (67%) of all attacks involving ransomware were initiated via phishing email.
Ransomware is a type of malware that encrypts the data on an infected computer. This prevents users from accessing their files. The attacker then demands victims pay a ransom to regain access to their files, often in a form of digital currency like Bitcoin.
Luckily, there are actions that you can take to mitigate the danger of this kind of attack.
Backing Up Data
It’s always a good idea to back up important or sensitive information in a safe place. Often, backups are stored on an external hard drive. If your files are locked away by ransomware, a clean backup is the best way to regain access to those files.
Unfortunately, ransomware can restrict access to any drive that is connected once your computer is infected; this includes external hard drives, flash drives, and physical discs. Thus, a backup should remain disconnected from your computer when not in use.
Should You Pay the Ransom?
Paying the ransom might seem convenient enough, but it also assumes attackers will stay true to their word. There is never a guarantee that you will regain access to your files after paying the ransom; in any case, attackers are likely to leave other malicious files behind.
Taking these facts into consideration, paying the ransom is an ill-advised choice when there are other alternatives available.
Prevention
In some cases, encrypted files can be recovered using a specialty decryption tool, or by completing a secure wipe of the system, then restoring your data from a point prior to the infection.
In most cases, however, the best time to stop a ransomware attack is before it happens. Ways to lessen the risk of an attack include:
Exercising caution while surfing the web and checking your inbox.
Making sure your anti-virus is up-to-date.
Regularly backing up your files, and keeping that backup in a safe place.
Reporting any suspicious messages you receive immediately.
If you suspect that you have received a spear phishing email at work, follow our procedures for reporting it immediately.