A recent spike in cryptolocker ransomware attacks is putting businesses in the firing line.
A number of successful cyber attacks have adversely affected businesses in Western Australia, with evidence of an increase in emergency restores from backup to recover from cryptolocker infections.
In a nutshell, cryptolocker ransomware works as a viral infection which encrypts any files it can access.
Without the encryption key, the files are locked and inaccessible. If the attack is extensive, your entire IT system may be locked out.
Once your system is infected you have the choice of paying the ransom for the key to decrypt the files, or deleting the encrypted files and recovering your data from the last backup.
There are various different manifestations of how it works. None of them are pleasant.
Without meaning to be alarmist, all businesses are in the firing line for malicious attacks and exploitation. It is apparent that targeting of businesses for infection and exploitation is random and widespread.
Remember there are no absolutes in cyber security. Risk factors like zero-day virus infections (where a virus is so new it is not recognised) and human nature (where curiosity, trust or confusion can lead to viral infection) cannot be eliminated.
However, similar to physical security against theft with door locks, monitored alarms and insurance, protecting your business against cyber threats requires reasonable and practical protections to be applied in multiple ways.
Below I have listed basic practices to minimise the risk of cryptolocker infection, limit the scope of any infection and aid recovery if you are infected. Most of these practices are simple to enact and maintain.
If you believe you have been targeted, or wish to learn more about preventing cyber attacks, contact XCy today for more information about our cyber IT solutions, IT services and support.
Phone 1300 929 247
Phone (08) 9460 3800