Five Ways to Become a Smaller Target for Ransomware Hackers

Advertisement
By Associated Press | Updated: 6 April 2016 18:13 IST
Five Ways to Become a Smaller Target for Ransomware Hackers
Hacking for ransom is on the rise - on pace to beat out last year's figures - and hits people where it hurts, locking them out of files, photos and critical records until they pay hackers a bounty to restore their access. Hackers bait users to click on infected email links or open infected attachments, or they take advantage of outdated and vulnerable systems.

Victims see important files scrambled into encrypted gobbledygook, as an electronic ransom note warns that if they ever want to see those files again in a readable format, they must pay money in virtual currency, known as bitcoin.

Last year's 2,453 reports of ransomware hackings totaled a reported loss of $24.1 million (roughly Rs. 160 crores), making up nearly one-third of the complaints over the past decade. They also represented 4 percent of the $57.6 million in reported losses since 2005. Such losses are significantly higher than any paid ransoms because companies routinely include remediation costs, lost productivity, legal fees and sometimes even the price of lost data in their estimates.

What's priceless is avoiding the hack altogether.

Here are five tips to make yourself a less likely victim:

Make safe and secure backups
Once your files are encrypted, it's nearly always game over. Backups often are out of date and missing critical information.

Advertisement

Ransomware has become increasingly sophisticated and effective at separating users from the contents of their computers. For example, sometimes it targets backup files on an external drive. You should make multiple backups - to cloud services and using physical disk drives, at regular and frequent intervals. It's a good idea to back up files to a drive that remains entirely disconnected from your network.

Update and patch your systems
The recent samsam virus-like attack takes advantage of at least two security vulnerabilities on servers, including one discovered in 2007. Updating software will take care of some bad vulnerabilities. Browsers such as Chrome will automatically update behind the scenes, saving you the time and deterring hackers.

Advertisement

Use antivirus software
It's basic but using antivirus will at least protect you from the most basic, well-known viruses by scanning your system against the known fingerprints of these viruses. Low-end criminals take advantage of less savvy users with such known viruses even though malware is constantly changing and antivirus is frequently days behind detecting it.

Educate your workforce
Basic cyber hygiene such as ensuring workers don't click on questionable links or open suspicious attachments can save headaches. System administrators should ensure that employees don't have unnecessary access to parts of the network that aren't critical to their work. This helps limit the spread of ransomware if hackers do get into your system.

Advertisement

If hit, don't wait and see
When hackers hit MedStar Health Inc., the hospital chain shut down its network as soon as it discovered ransomware on its systems. That action prevented the continued encryption - and possible loss - of more files. Hackers will sometimes encourage you to keep your computer on and attached to the network but don't be fooled.

If you're facing a ransom demand and locked out of your files, law enforcement and cyber-security experts discourage paying ransoms because it incentivizes hackers and pays for their future attacks. There's also no guarantee all files will be restored. Many organizations without updated backups may decide regaining access to critical files, such as customer data, and avoiding public embarrassment is worth the cost.

The hackers, of course, are counting on that.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Hackers, Hacking, Internet, Ransomware
Advertisement

Related Stories

Popular Mobile Brands
  1. Nothing Phone 3 to Be Manufactured in India, Company Reveals Model Number
  2. OnePlus Nord 5 Allegedly Spotted on Geekbench With This Chipset
  3. Top Smartphones Under Rs 30,000 in India (June 2025): Check List
  4. Poco F7 Spotted on Geekbench With Snapdragon 8s Gen 4, 12GB of RAM
  5. Realme 15 Pro Tipped to Launch in India in These Colour Options
  6. Sony Announces Limited-Period Discount on Audio Products in India
  1. Samsung Galaxy Buds Core, Buds 3 FE Surface in Galaxy Buds Controller App: Report
  2. OnePlus 13 to Be Used for All BGMI Matches at Upcoming BGMS 2025 Tournament
  3. Sony Announces Limited-Period Discount on Audio Products in India for World Music Day
  4. Brazil's Top Court Votes to Hold Social Media Platforms Accountable for User Posts
  5. Nintendo Switch 2 Closer to Xbox Series S Than PS4 in Power, Says Koei Tecmo
  6. Nothing Phone 3 to Be Manufactured in India, Company Reveals Portion of Rear Panel With Model Number
  7. Infinix GT 30 Pro 5G Now Available for Purchase in India: Price, Specifications, Offers
  8. Axiom-4 Mission Carrying Indian Astronaut Shubhanshu Shukla Reportedly Delayed Due to LOx Leak
  9. Apple to Reportedly Use AI-Powered Tags to Improve App Discoverability on the App Store
  10. CBI Arrests Cyber Criminal, Seizes Cryptocurrencies Worth Rs. 2.8 Crore
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.