Follow us

Top tips to help protect your business against ransomware attacks

Ransomware is designed to block users or organisations from accessing their own files or systems. The attackers will encrypt company files and then demand a ransom payment from the victim in exchange for providing the access back. Don’t fall victim to ransom attacks. Follow these simple steps to help protect your business:

 

Block delivery and spread of malicious software:

  • Use a virtual private network (VPN), secured using multifactor authentication (MFA) for remote access to your network.
  • Ensure firewalls are in place and that these are adequate and up to date.
  • Have pro-active control over user privileges and remove permissions that are no longer required.

 

Backup data regularly and keep software updated:

  • Backing up data is essential; make it part of your regular business regime.
  • Make multiple copies of data using different solutions and keep at least one copy offline.
  • Scan backups for viruses before reinstating data, as ransomware may have replicate to them.
  • Apply software updates (patches) as soon as they become available.

 

Plan for a cyber incident:

  • Identify your critical data and digital assets.
  • Assess what is the likely impact, should these be attacked.
  • Have a response to any ransom demand pre-prepared.
  • Have a communication plan in place, which considers internal and external stakeholders.

Business impact analysis is at the centre of business continuity management.

 

Do not pay the ransom!

UK law enforcement strongly advise against the payment of ransom demands.

If the ransom is paid:

  • There is no guarantee that an organisation will get access to their data or computer back.
  • The computer/network will still be infected.
  • It will be funding criminal activities.
  • An organisation is more likely to be a future target for cyber criminals.

To discuss how you can better protect your business, give Darwin Clayton a call on 01892 511 144 or email us at info@dcuk.co.uk

 

 

 

 

 

 

 

Related Articles

Programming code abstract technology background

Your Business is at Risk

Cyber & Data risks are an exposure that no modern business can escape, and the financial impact of system interruption, privacy and cyber-crime events are now felt across all sectors. According to

Read More »

Multi-Factor Authentication

Have you heard of Multi-Factor Authentication or MFA?  While it might not mean much to some of us, it’s about to become one of the buzzwords in the Cyber Insurance industry. Here’s

Read More »