Five Ways to Become a Smaller Target for Ransomware Hackers

Advertisement
By Associated Press | Updated: 6 April 2016 18:13 IST
Five Ways to Become a Smaller Target for Ransomware Hackers
Hacking for ransom is on the rise - on pace to beat out last year's figures - and hits people where it hurts, locking them out of files, photos and critical records until they pay hackers a bounty to restore their access. Hackers bait users to click on infected email links or open infected attachments, or they take advantage of outdated and vulnerable systems.

Victims see important files scrambled into encrypted gobbledygook, as an electronic ransom note warns that if they ever want to see those files again in a readable format, they must pay money in virtual currency, known as bitcoin.

Last year's 2,453 reports of ransomware hackings totaled a reported loss of $24.1 million (roughly Rs. 160 crores), making up nearly one-third of the complaints over the past decade. They also represented 4 percent of the $57.6 million in reported losses since 2005. Such losses are significantly higher than any paid ransoms because companies routinely include remediation costs, lost productivity, legal fees and sometimes even the price of lost data in their estimates.

What's priceless is avoiding the hack altogether.

Here are five tips to make yourself a less likely victim:

Make safe and secure backups
Once your files are encrypted, it's nearly always game over. Backups often are out of date and missing critical information.

Advertisement

Ransomware has become increasingly sophisticated and effective at separating users from the contents of their computers. For example, sometimes it targets backup files on an external drive. You should make multiple backups - to cloud services and using physical disk drives, at regular and frequent intervals. It's a good idea to back up files to a drive that remains entirely disconnected from your network.

Update and patch your systems
The recent samsam virus-like attack takes advantage of at least two security vulnerabilities on servers, including one discovered in 2007. Updating software will take care of some bad vulnerabilities. Browsers such as Chrome will automatically update behind the scenes, saving you the time and deterring hackers.

Advertisement

Use antivirus software
It's basic but using antivirus will at least protect you from the most basic, well-known viruses by scanning your system against the known fingerprints of these viruses. Low-end criminals take advantage of less savvy users with such known viruses even though malware is constantly changing and antivirus is frequently days behind detecting it.

Educate your workforce
Basic cyber hygiene such as ensuring workers don't click on questionable links or open suspicious attachments can save headaches. System administrators should ensure that employees don't have unnecessary access to parts of the network that aren't critical to their work. This helps limit the spread of ransomware if hackers do get into your system.

Advertisement

If hit, don't wait and see
When hackers hit MedStar Health Inc., the hospital chain shut down its network as soon as it discovered ransomware on its systems. That action prevented the continued encryption - and possible loss - of more files. Hackers will sometimes encourage you to keep your computer on and attached to the network but don't be fooled.

If you're facing a ransom demand and locked out of your files, law enforcement and cyber-security experts discourage paying ransoms because it incentivizes hackers and pays for their future attacks. There's also no guarantee all files will be restored. Many organizations without updated backups may decide regaining access to critical files, such as customer data, and avoiding public embarrassment is worth the cost.

The hackers, of course, are counting on that.

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Hackers, Hacking, Internet, Ransomware
Advertisement

Related Stories

Popular Mobile Brands
  1. Mozilla's Pocket Shuts Down in July: Try These Four Pocket Alternatives
  1. WhatsApp Reportedly Developing Unified Chat Media Hub Feature for Web Client
  2. OnePlus 13s to Arrive With Support for OnePlus AI Suite; Plus Key Details Revealed Ahead of Launch
  3. Moto G56 5G Specifications Reportedly Listed on Company's Websites Ahead of Global Launch
  4. Samsung Galaxy S25 Edge Begins Shipping to Customers During Pre-Order Window: Price, Specifications
  5. OnePlus Ace 5 Ultra With MediaTek Dimensity 9400+ SoC Launched Alongside Ace 5 Racing Edition
  6. Xiaomi Mix Flip 2 Launch Timeline Leaked; Tipped to Arrive With Snapdragon 8 Elite Chipset
  7. Elon Musk Says X Money Payments Will Launch in 'Very Limited Access Beta' Soon
  8. Dubai's Real Estate Tokenisation Pilot Goes Live on Dedicated Platform Prypco Mint: Details
  9. Oppo Reno 14, Reno 14 Pro India Launch Timeline and Colourways Leaked
  10. Quantum Tech Could Finally Let Astronomers Snap Direct Images of Earth-Like Exoplanets
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.