Call us: 6460 6460
hello@enabletech.com.au
Enable ITEnable ITEnable ITEnable IT
  • Home
  • Services
  • Cloud
  • Why Enable
  • Blog
  • Contact Us

10 important steps to protect your business against Cryptolocker scams

    Home enableblog 10 important steps to protect your business against Cryptolocker scams
    NextPrevious

    10 important steps to protect your business against Cryptolocker scams

    By Kim | enableblog, Problems and Pain, Risk and Ruin | Comments are Closed | 18 September, 2015 | 0

    The number one IT threat facing business today is Cryptolocker (randsomware). The reason why it is so dangerous is it will encrypt all files that a user has access to. Imagine the impact on your business if all files stored on network shares and drop boxes were effectively destroyed. The files cannot be recovered unless you pay the ransom and are issued with the unlocking key by the bad guys.

    So how can you protect against crytolocker? You can’t! All we can do is minimise the risk. Ultimately if you get an email from Telstra or Australia Post saying to download a file and you go through with it, then you have been deceived into infecting yourself.

    So what steps should you take to minimise your risks? We have developed a plan that we are in the process of rolling out to our supported clients. This blog is the start of that process.

    1. Inform and educate staff about cryptolocker and how it tricks them.
    2. Ensure that you have a good imaging backup solution, preferably one that incrementally updates every 15mins.
    3. Ensure that you have an offsite email washing solution, or one that updates itself real-time.
    4. Install a Unified Threat Management device (UTM). These scan incoming emails and web traffic again. Potentially they can block a nasty that has been clicked on.
    5. Have a good quality centrally managed Anti-Virus solution that is deployed to all the PC’s
    6. Make sure that all computers are fully patched.
    7. Lock file permissions on PC’s so that applications cannot be installed to certain directories.
    8. Restrict access rights to shared folders/files.
    9. Alter inbound MS Exchange transport rule to issue a warning if an email has certain file attachment types.
    10. Ensure inbound firewall rules will only accept email from your remote email washing service.

    If, in a moment of temporary insanity you click on one of these links then all you can do is get your computer off the network FAST!! Pull the blue cable, pull the power cable, flick the battery out of your laptop and call for help immediately. Ransomware works fast and silently. It works through all the data that your computer can see and makes it useless.

    If you have an email that looks a little suspicious call us to verify. Do not send it around your office for second opinions. The duh factor is a powerful force 🙂

    cryptolocker, data protention, security, virus

    Kim

    More posts by Kim

    Related Post

    • Medical Centre Hacked

      By Kim | Comments are Closed

      OK, we have all read about the well publicised hacking of a Medical Centre in Queensland.  Most businesses are now asking how can they take better precautions to avoid becoming victims themselves.  Having a reasonablyRead more

    NextPrevious

    Recent Posts

    • How to identify a scam email.
    • Running lean: the smart way to grow your small business while minimising IT costs
    • Medical Centre Hacked
    • How effective is your Antivirus?
    • 10 important steps to protect your business against Cryptolocker scams

    Categories

    • Cloud Corner
    • enableblog
    • Managed Services
    • New Tech
    • Problems and Pain
    • Risk and Ruin
    • Video

    About Enable IT

    Enable Technology Pty Ltd commenced operations in 2001. We have come a long way from our single room setup. Our growth has been steady and deliberate, with some strategic acquisitions along the way. We like to think that the staff and customers from Hardware House, ZoomIT and TSA have benefited from the Enable Way.

    Recent Posts

    • How to identify a scam email.

      We are surprised how often people are tricked into clicking on bad

      31 August, 2017
    • Running lean: the smart way to grow your small business while minimising IT costs

      So, you have successfully nurtured your new business through the crawling stage.

      12 September, 2016

    Contact us

    Head Office
    224 Stirling St, Perth WA 6000

    Phone Number
    +08 6460 6460

    Email Address
    info (@) enabletech.com.au

    Copyright 2020 Enable IT Services | All Rights Reserved | Site by Start Digital
    • Blog
    • Cloud
    • Contact Enable IT
    • Home
    • Lean Starter IT Pack
    • Services
    • Video
    • Why Enable
    Enable IT