{"id":245,"date":"2017-04-21T09:38:57","date_gmt":"2017-04-21T13:38:57","guid":{"rendered":"http:\/\/www.heliotropicsystems.com\/blog\/?p=245"},"modified":"2017-04-21T09:39:38","modified_gmt":"2017-04-21T13:39:38","slug":"ransomware-thoughts","status":"publish","type":"post","link":"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/ransomware-thoughts\/","title":{"rendered":"Ransomware Thoughts"},"content":{"rendered":"<p>In a recent article about ransomware and the affect it has on small businesses, the author states that \u201csecurity experts say the first thing to do after a ransomware event is to upgrade security and backup processes.\u201d<\/p>\n<p>I had to read that twice before I realized how true it was and how erroneous the statement is.\u00a0 If an IT consultant is taking these steps <em>after<\/em> the fact, then they have failed to adequately protect their client.\u00a0 I cannot see working that way \u2013 it is backwards, last generation thinking.<\/p>\n<p>You want to engage with an IT consultant who prepares an entire range of security measures for blocking the possibility of ransomware from affecting your small business in the first place.\u00a0 Implementing heightened security and backup after the fact won\u2019t cut it; security measures have to be implemented <strong>before<\/strong> a calamity occurs.<\/p>\n<p>A new proverb in our industry states that \u201cthere\u2019s at least one employee in the office that will click on anything.\u201d\u00a0 And because that is more often true than not, you need more than the standard list of preventative measures in place, which consist of:<\/p>\n<ul>\n<li>Making sure you are running a robust security solution (Internet security, anti-virus, and anti-malware)<\/li>\n<li>Keeping the operating system up-to-date<\/li>\n<li>Avoiding the use of plug-ins (such as Java, Adobe Flash, and Silverlight) in your web browsers<\/li>\n<li>Being careful with email attachments and links in emails from people you don\u2019t know<\/li>\n<\/ul>\n<p>While those steps are usually issued to help safeguard home users, a small business owner also needs to include the following elevated measures:<\/p>\n<ul>\n<li>Employing an advanced Unified Threat Management device (firewall)<\/li>\n<li>Enabling server and desktop back-up to a local device and the cloud<\/li>\n<\/ul>\n<p>These additional factors should help obviate the statement made by the sources for the article\u2019s author.<\/p>\n<p>However, the most important step any security-conscious IT consultant must take is to ensure that appropriate employee education takes place on a regular basis.\u00a0 This is because the ransomware threat landscape is constantly evolving.  Cybercriminals have found a highly effective and lucrative approach to illegally making money.\u00a0 As new forms of socially engineered threats appear, employees must be reminded and their awareness must be sharpened to distinguish between a valid email and a new phishing threat.<\/p>\n<p>If you want this kind of training for your staff, contact me for further information.\u00a0 Don\u2019t be a victim to ransomware!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent article about ransomware and the affect it has on small businesses, the author states that \u201csecurity experts say the first thing to do after a ransomware event is to upgrade security and backup processes.\u201d I had to read that twice before I realized how true it was and how erroneous the statement <span class=\"ellipsis\">&hellip;<\/span> <span class=\"more-link-wrap\"><a href=\"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/ransomware-thoughts\/\" class=\"more-link\"><span>Read More &rarr;<\/span><\/a><\/span><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[41,43,40],"tags":[],"class_list":["post-245","post","type-post","status-publish","format-standard","hentry","category-phishing","category-ransomware","category-security"],"_links":{"self":[{"href":"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":1,"href":"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"predecessor-version":[{"id":246,"href":"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/245\/revisions\/246"}],"wp:attachment":[{"href":"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.heliotropicsystems.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}