|New security threat: CryptoWall|
In October of last year news broke about a new form of malware called Cryptolocker. This malware posed a particularly large threat to many business users and led to many quick and important security updates. Now, almost a year later, it appears that the second version of this - CryptoWall - has been released and is beginning to infect users.
What is Crypto malware?
Crypto malware is a type of trojan horse that when installed onto computers or devices, holds the data and system hostage. This is done by locking valuable or important files with a strong encryption. You then see a pop-up open informing you that you have a set amount of time to pay for a key which will unlock the encryption. If you don't pay before the deadline, your files are deleted.
When this malware surfaced last year, many users were understandably more than a little worried and took strong precautions to ensure they did not get infected. Despite these efforts, it really didn't go away until earlier this year, when security experts introduced a number of online portals that can un-encrypt files affected by Cryptolocker, essentially neutralizing the threat, until now that is. A recently updated version is threatening users once again.
Cryptolocker 2.0, aka. CryptoWall
Possibly because of efforts by security firms to neutralize the Cryptolocker threat, the various developers of the malware have come back with an improved version, CryptoWall and it is a threat that all businesses should be aware of.
With CryptoWall, the transmission and infection methods remain the same as they did with the first version: It is most commonly found in zipped folders and PDF files sent over email. Most emails with the malware are disguised as invoices, bills, complaints, and other business messages that we are likely to open.
The developers did however make some "improvements" to the malware that make it more difficult to deal with for most users. These changes include:
How do I prevent my systems and devices from being infected?
Unlike other viruses and malware, CryptoWall doesn't go after passwords or account names, so the usual changing of your passwords won't really help. The best ways to prevent this from getting onto your systems is:
Should your files be attacked and encrypted by this malware, then the first thing you should do is to contact us. We can work with you to help find a solution that will not end up in you having to pay the ransom to recover your files.
If you are looking to learn more about CryptoWall malware and how to boost your security and protect your data and systems, then we could you your first line of tech defence.
Published with permission from TechAdvisory.org. Source.
|What is pre-drafting emails?|
As a business owner, you probably send out emails pretty regularly. Some of these emails are likely to colleagues who will then send a message to a third party on your behalf. This inevitably entails going back-and-forth between you and your employee. This can cut down productivity and lead to mistakes. One way to avoid this is to pre-draft the message that will be sent along.
|3 Main IT areas to invest in|
Technology is constantly evolving, so much so that it feels like there is a near constant stream of systems and devices being released on a daily basis. This fast-paced development has forced companies and their IT teams to move rapidly with the times. As such, IT as a whole has been basically divided into three main areas, which companies should be investing in.
|Small business gamification|
For many businesses it is important that there is steady and productive interaction with clients and that they can capture important data from these interactions. While there are many ways to achieve both these objectives, there is one way that is gaining traction with many companies, especially those who want to capture better data: gamification.
|When to upgrade BCP technology|
Business continuity plans are an important part of any business, especially if owners and managers want to see a business through any disaster. In order to have an effective plan, it is important that businesses integrates technology that can support a plan. The fact is though that this technology will eventually need to be replaced. Here are five tips that can help you determine whether you need to upgrade to a new system, or replace existing ones.