One critical aspect of maintaining a secure IT environment is ...
But first, let me talk about one of my customers and why I decided to write this article (even if though it seems so obvious). The person in question handles accounting and receives all accounting related emails. He got an email stating he had an unpaid invoice. He didn’t know the sender (strike 1), but it could still have been “real”. The email had an attachment, instead of inline text, so he had to open that attachment (strike 2). The attachment was actually an encrypted zip, but “luckily” the password was provided, so he entered the password (strike 3). At which point the program encrypted his entire PC. Unfortunately, that PC contained the entire accounting for the company with the backups on an attached external hard drive (which also got encrypted…). I don’t need to tell you what happened next (they paid), but I will tell what did not happen next (they did not implement a layered security approach and a versioned [offline] backup solution).
Protecting yourself from ransomware is not that different from protecting from any malware, layered protection:
Steps 1 to 6 should be a given for all organizations, large or small (if it’s not, get someone to help you).
Steps 1 to 3 are also really easy for home and should be the basis of safe computing at home.
Ping me if you have any questions and be safe!
Loïc
One critical aspect of maintaining a secure IT environment is ...
5-2475 Skymark ave.
Mississauga, ON, L4W 4Y6
16192 Coastal Highway
Lewes, DE 19958
© Copyright 2025 ALCiT | All Rights Reserved