Ransomware Protection Perth
Dear clients and associates,
With the latest ransomware attack spreading globally, we would like to highlight the importance of user education, an approved software list, regular backups, replacing legacy systems and software to protect your business.
The information below serves as a basic guide and with the assumption that your office has implemented the latest firewall, anti-virus and anti-spam definitions.
Please contact Pietro or myself for a more in-depth discussion on how to protect your business against such attacks.
User Education
This is usually the main entry point for any virus attack. Two internal policies that can be easily adopted and implemented. Firstly, organizations should consider restricting employees using their work email and address for their personal online purchases. Secondly, work email addresses should not be used to subscribe to non-business related mailing lists.
Approved Software List
Most anti-virus software has this ability built in. It monitors and only allows approved software to run. In many cases, it helps to slow down the spread of the viruses across the network.
Regular Backups
Ransomware encrypts data which stop users accessing it across the network. The fastest and safest way to recover is through backups. With the cost of online backup storage dramatically reducing over the years, we strongly encourage clients to have both onsite and off-site replicated backups.
Legacy System and Software
Many organizations are still running older version of Windows operating system like Windows 7, 8 and SBS 2003/2008 due to their legacy software needs. These operating systems are vulnerable to hackers gaining access through the “back door”. Organizations should make a conscious effort to replace legacy software.
As mentioned earlier, this is just a basic guide. We can discuss in detail and propose solutions that suit your budget and business requirements.
Best Regards,
Anderson Chong