White Paper - Crypto Virus. A guide to protecting your IT



Similar documents
Internet threats: steps to security for your small business

What Do You Mean My Cloud Data Isn t Secure?

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

Access Tropical Cloud Desktop from Any Device

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

Open an attachment and bring down your network?

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Cloud Storage vs Physical Media What you need to know!

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Whitepaper: Cloud Computing for Credit Unions

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

ScoMIS Encryption Service

Countermeasures against Spyware

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

What you need to know to keep your computer safe on the Internet

MONTHLY WEBSITE MAINTENANCE PACKAGES

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/

System Management. What are my options for deploying System Management on remote computers?

ZNetLive Malware Monitoring

Computer Security Maintenance Information and Self-Check Activities

PC Security and Maintenance

Securing Your Business s Bank Account

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Cybersecurity Best Practices

MAXIMUM PROTECTION, MINIMUM DOWNTIME

Computer Viruses: How to Avoid Infection

ReadySpace Limited Unit J, 16/F Reason Group Tower, Castle PeakRoad, Kwai Chung, N.T.

Malware & Botnets. Botnets

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

10 Smart Ideas for. Keeping Data Safe. From Hackers

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

F-Secure Anti-Virus for Mac 2015

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Is your business still wasting time and money on PCs and Servers?

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

Infocomm Sec rity is incomplete without U Be aware,

Symantec Endpoint Protection Analyzer Report

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

Ten Tips to Avoid Viruses and Spyware

Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you

GlobalSign Malware Monitoring

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Topic 1 Lesson 1: Importance of network security

October Is National Cyber Security Awareness Month!

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Top five strategies for combating modern threats Is anti-virus dead?

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Managed Service Plans

Stable and Secure Network Infrastructure Benchmarks

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

STOP. THINK. CONNECT. Online Safety Quiz

Information Security

How to stay safe online

2012 NCSA / Symantec. National Small Business Study

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Introduction. PCI DSS Overview

Security Consultant Scenario INFO Term Project. Brad S. Brady. Drexel University

HACKER INTELLIGENCE INITIATIVE. The Secret Behind CryptoWall s Success

F-Secure Anti-Virus for Mac. User's Guide

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Know the Risks. Protect Yourself. Protect Your Business.

31 Ways To Make Your Computer System More Secure

CSUF Tech Day Security Awareness Overview Dale Coddington, Information Security Office

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Windows Operating Systems. Basic Security

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Transcription:

White Paper - Crypto Virus A guide to protecting your IT

Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra Scanning Tools... 3 Internal Email Servers vs Hosted Email Servers... 4 3 rd Party Hosted Email Security Solution... 4 Prevention is Key: Training... 4 Patched, Updated & Secured.... 5 Backups, Backups, Backups!... 5 What to do if you are infected?... 5 Page 2 of 5

What is Crypto Virus? Crypto Virus is a powerful, well-designed malicious software which is constantly updated and changed. It is designed by pirates to encrypt data which can only be decrypted after you pay them a ransom. This is where Crypto Virus is unique, the creators of the malware have created a full business model around the infection, and have kept honorable in providing the decryption key where ransoms are paid. Crypto Virus has been around for a number of years now, and shows no signs of going away or its development ceasing; and as such is an ongoing and serious threat. In a world where big company hacks headline every month and Australia alone is hit for $1.65 Billion in cybercrime each year (and climbing), businesses really need to pay attention to the darker side of IT. How to protect yourself from Crypto Virus? There is no silver bullet to protect yourself from Crypto Virus, and this is mainly due to it getting ongoing updates to its software; thus constantly shifting the way standard defenses need to protect your systems from the virus. Antivirus or Managed Agents Antivirus or managed agents may seem like a logical fix to fully protect yourself but not all antivirus are made equal. Nor do they automatically protect against all threats. When a new virus is released or a new version of a virus is released antivirus software needs to be taught how to fight against it. This is done by engineers who learn how a virus works and how to disable malicious software; then giving those moves to the antivirus software via means of definition updates. It is for this reason that by default Tropical Business Solutions own antivirus product, Managed Agent, has updates pushed to it every 3 hours to ensure the very latest defense against threats on the internet. Even this is not fail-proof. After a new virus is released into the wild, learning how they work can take days or even weeks; during which time you can be vulnerable regardless of the antivirus software you use. There is a quality of antivirus software to consider as well an example is the inbuilt Microsoft antivirus that comes with Windows. When compared to other free and paid antivirus products is one of the worst software s on the market for actually protecting your computer. The Tropical Managed Agent (with Antivirus in built) by comparison was one of the first software s on the market that we saw actually disable iterations of the Crypto Virus itself, a fact we are pretty proud of. As standard practice however you should always scan all files you open on disks, USB drives or downloaded from the internet. Antivirus is still a good line of defense to keep protected; but it should no longer be your only one. Enhanced Email Services & Extra Scanning Tools Email is one of the more common ways for a system to become infected and for whole offices to have downtime from virus infections. This is also true of the Crypto Virus as it is designed to copy itself and encrypt files on network shared drives as well as local computers; which can stop work dead in a business. To make emails a safer place there are a few key things to consider; Page 3 of 5

Internal Email Servers vs Hosted Email Servers In-house email is a great solution for some business, however in some cases hosted solutions may be better. This can be for a number of reasons such as cheaper server licenses, increased reliability (data center level uptime), but in this context; protection, better screening of viruses. The thing about hosted email solutions is that A LOT more money and effort can be spent on that solution then a small business email server in their office. Because of this you have many MANY different levels of scanning technology directed at your emails to determine if they should be blocked and deleted or approved to be forwarded to your computer. Tropical Business Solutions Cloud Email is no different and has a pretty good track record of keeping clients safe. 3 rd Party Hosted Email Security Solution If you prefer to have your email in house, or the business case dictates you must have it locally housed; or even if you want further protection over your other 3 rd party hosted email there are products that allow you to push your emails over a moat of sorts which checks emails before they hit your email server; to gain the same benefits of protection that hosted email solutions have. Tropical Business Solutions also has a product like this called Tropical Cloud Mail Protection, which even works with other mail servers (such as google mail or office 365), and has added benefits like being able to act as your mail server at times when your own server or service is offline; which can be very handy. Prevention is Key: Training As with most things; training is key. By teaching your staff to practice techniques below you can save a lot of money, downtime and heartache; Don t download or open ANY unknown attachments in an email. This is especially true if it is from someone you don t know. Don t click on emails links for sites and companies that normally wouldn t send you links. I.e. banks rarely send mass emails, nor does the ATO. If you hover your mouse over a link in outlook the actual URL of an address will show up if you are unsure; make sure the domain is what you would expect it to be before clicking it if you need too. Always keep your antivirus updated (with Tropical Managed Agents this happens automatically as long as you are connected to the internet). Turn off Macros in Microsoft Office Word, Excel & PowerPoint as they can be used as an entry point to your computer. If you copy a file from a USB drive or CD, scan it first to make sure it doesn t have a virus on it. Only copy files from media sources you trust Don t go to websites that have a shady reputation (file sharing sites, adult content, etc), browsing too deep into search engine results & ignore scareware popup windows. These web pages have a reputation for being a big source of virus infections. (The Tropical Managed Agent does have an add on that can be enabled for web security; which checks the known reputation of a website, scans for viruses, and can even block based on the category of a website (i.e. adult, illegal, etc.). You can also get corporate internet usage information from the tool as well). If your computer starts to behave in a way you wouldn t expect contact tech support ASAP. Page 4 of 5

Patched, Updated & Secured. Windows and other software updates can be annoying (BELIEVE US, we know!), but they serve a critical purpose in the protection of your computer. Updates fix holes or vulnerabilities that hackers and viruses take advantage of to damage computers or steal data. Software companies like Microsoft keep an eye on this and as they find their software being taken advantage of, release fixes to counter the potential attacks to ensure you are able to work on a safer platform. This is obviously never a done thing especially with Crypto virus, as the bad guys keep working to find ways in; so regular updates really are a must for your computers. It should be noted here that our Tropical Managed Agent is a great tool to automate the majority of update deployments for all the big companies software such as Adobe, Microsoft, etc. Backups, Backups, Backups! Backups are our last line of defense. If everything else fails recovery from backups may be your only bet, so regular offsite backups are critical to ensure that no matter what you still will have data. There are a few different flavors of backups now; Your more traditional backup to USB hard drive option. This is good but does require a staff member to manually swap out hard drives and take offsite to ensure backups occur. Software can be used to automate the actual backup of data overnight however. Cloud Backups have become a lot more popular in recent years (which Tropical Cloud Backup is a very good example of). This automates backups so no human interaction is required. This occurs live (as files are changed) or at regular intervals throughout the day and sends all data offsite over the internet. What to do if you are infected? If your computer is infected with Crypto Virus - or any virus, your best bet is to disconnect it from the internet & network immediately and shutdown. Crypto Virus especially is known for encrypting files not only on a local computer but on other computers on the network as well via network shares which means servers can be at risk too. It is also a common practice for a lot of different viruses to attempt and replicate themselves onto other computers on a local network and over the internet; which is why disconnecting is very important. Shutting down the computers and awaiting a tech to come and look at the machine can help prevent damage to files on the computer; especially in the encryption phase; and help keeping your down time to a minimum. Depending on the severity of the issue, a decision will be made to either fresh install or repair your computer to achieve the best outcome. Don t forget our helpdesk is able to support at a moment s notice: 08 8922 0000 or help@tropicalbusiness.com.au Note: Commercial in Confidence Information. This document, including any associated elements, documents or files; remain the intellectual property of Tropical Business Solutions Pty Ltd. Any information contained within this document should be considered privileged and confidential; and should not be used for any purpose other than the sole purpose for which you received it. Disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited, unless approved in writing by Tropical Business Solutions Pty Ltd. If you have any further questions regarding the above statement, please email help@tropicalbusiness.com.au for more information. Page 5 of 5