Blog

"Three rules" to protect important data from the surge of ransomware attacks and their threats

Ransomware attacks are in the spotlight, and there are no signs that the epidemic will subside. From shutting down oil pipelines to hijacking medical institution networks, ransomware is now the most commonly used means of cyberattacks.

A ransomware attack can make important files and systems inaccessible, which can lead to serious consequences. Moreover, the decision to pay cash is required to recover the data. Moreover, there is no guarantee that the system will be restored even if the requested amount is paid.

This is where the name ransomware comes from, as attackers demand a ransom in exchange for data. There are several patterns of attacks, but usually it's easy to see that it's ransomware. The file will be encrypted (sometimes double encrypted), so you'll need a key to unlock it. Damage can quickly spread to computers and the entire network, and can be completely locked out of a particular system, including other systems in the same network.

Developing and implementing ransomware is not particularly difficult, and you can get money if the attack is successful. Initially, it was targeted at individuals, but eventually companies were targeted, and recently there have been a series of incidents in which government agencies and companies that operate public infrastructure are attacked. In any case, there is a real threat to everyone, but how do you protect yourself?

OS and software updates required

The method of protecting your computer from ransomware is not much different from general anti-malware, and the required rules are similar. First, a ransomware attack would not be possible without access to the system. Attackers then attempt to break into the system, usually through malicious applications. This means that you must be very careful when downloading files of unknown origin via the Internet or email.

Hackers use a variety of social engineering techniques (for example, pretending to be an urgent email from their boss) to install things that shouldn't be installed, or to pretend to be attachments and download files. When you open and run something on your computer, think twice, especially if it arrives without warning.

Even if ransomware is not installed, it may exploit security holes in other software on your computer and deploy it on your own. That's why you should keep as few programs on your PC as possible. When installing, make sure that the developer selects a product that has undergone security updates as appropriate.

In addition to paying attention to the operation of your computer and the programs you install, ransomware also has the golden rules of security: updates, protection, and backups. First, all malware, including ransomware, often exploits old, unupdated software. That's why it's important to keep all programs updated (both macOS and Windows) to keep them up to date.

The OS frequently asks for updates because it's really important. Having the latest updates installed is so important from a security standpoint that most programs automatically process updates in the background. For example, "Google Chrome" will be updated automatically, and if there is an update to be installed, the color of the "Menu" icon on the toolbar will change (it will change from orange to red if the upgrade is urgent).

Antivirus software is effective

When it comes to computer protection, it's essential to have high-quality security software installed, but this should be done regardless of ransomware protection. There is some debate about whether the security features built into the OS are sufficient, but they are very useful in terms of preventing malware threats, including ransomware.

Adding third-party antivirus software to this will make it even more effective. Some of the more famous are McAfee, Norton, Bitdefender, Avira, etc., all of which carefully monitor the system. However, it is up to the user to pay the additional cost (and change the necessary settings) to increase protection.

Ransomware usually targets systems and files on your computer. But if you know your username and password, you can even break into the cloud and encrypt the files there. For this reason, not only should passwords be strong, but also avoid reusing the same passwords (preferably using a password manager).

Also, turn on 2-step verification. That way, when you log in, you'll need additional information (such as the code sent to your smartphone) in addition to your username and password.

Regular backup of data is essential

The third rule to protect yourself from ransomware is to back up your computer and other devices on a regular basis. Whether it's an external hard drive or a cloud sync service, it's okay if you have a copy of the file out of the reach of ransomware.

However, I would like to write one important thing at the end. If the ransomware blocking the files on your computer has access to the backup, the backup will also be encrypted.

To avoid this, at least one of your backups should be set up so that it only occasionally connects to your main system. Alternatively, you can choose a product or service that has the ability to restore files retroactively and restore them to their pre-attack state.

急増するランサムウェア攻撃、その脅威から重要なデータを守るための「3つのルール」

Many cloud backups provide file versioning (for example, Dropbox has a "rewind" feature) that allows you to go back to that point at a specific date and time. This means that you can restore the data to its pre-encrypted state, which is very useful in the event of a ransomware attack. It's a good idea to check the service you are using for details.

As with any security threat, ransomware cannot be 100% protected, but the steps I've written so far minimize the risk. But keep in mind that ransomware attacks are a crime in the worst case. If you are injured, you can report it from the website of the Cyber ​​Security Infrastructure Security Agency (CISA) in the United States [Note: In Japan, the prefectural police have a cybercrime consultation desk].

* Click here for articles related to ransomware attacks by "WIRED".


Business

The biggest reason why the threat does not end even if a hacker group of ransomware attacks is arrested

Business

The threat of ransomware attacks continues: "500 million yen" paid by pipeline operators who succumbed to "ransom" demands

Business

The U.S. pipeline's suspension of operations made the world aware of the threat of ransomware attacks.



INFORMATION INFORMATION

Under recruitment of WIRED Japanese version "membership" members who can also participate in limited events!

"WIRED SZ Membership" is a member service that delivers a selection of long leads (feature articles) packed with insights for the next 10 years according to weekly themes. The exciting service, which can participate in the weekly members-only event, is running a one-week free trial!Click here for details


Hot Articles

How to Save Websites as PDF on iPhone or PC | Business Insider Japan

How to Save Websites as PDF on iPhone or PC | Business Insider Japan

Sign up for a free e-mail newsletter We'll send you a Business Insider Japan e-mail newsletter at 17:00 on weekdays. Check the terms of use You can save the website as a PDF from various web browsers including Safari on iPhone. Photo: Takuma Imamura Web page suddenly ...

READ MORE READ MORE
Yahoo! News Digitalizing the traditional "small pattern dyeing" pattern Crisis of disappearance, challenge of long-established president

Yahoo! News Digitalizing the traditional "small pattern dyeing" pattern Crisis of disappearance, challenge of long-established president

In the file in front of Mr. Atsushi Tomita, a well-preserved paper pattern is included so that it is not exposed to the air as much as possible. To prepare for digitization and prevent deterioration = Taken by Hiroyuki Kondo on the morning of December 10, 2021 at Tomita Dyeing Crafts in Shinjuku-ku, Tokyo ...

READ MORE READ MORE
 It's okay if you forget to record the news!How to see the famous scenes of the Olympics later on your smartphone

It's okay if you forget to record the news!How to see the famous scenes of the Olympics later on your smartphone

Explaining how to use the archive distribution The Tokyo Olympics attracts attention not only for players' play but also for unique commentary. Even if you miss it even though it became a hot topic, or if you did not record it, you can do it at your favorite timing later ...

READ MORE READ MORE

Related Articles