|CryptoLocker - what you need to know|
The security of a business computers and networks is likely top of mind for many business owners. There are constant threats that you need to be aware of, with one of the more prevalent being malware. It seems like nearly every week there is some new security threat that could potentially infect your systems. The latest is a particularly nasty piece of ransomware – CryptoLocker.
Knowledge is power so finding out more about CryptoLocker is recommended, as well as how you can take steps to protect your systems.
What is CryptoLocker?
This particularly nasty piece of malware infects user systems and locks files, threatening to delete them unless the hacker is paid. It is being spread four different ways:
CryptoLocker installs itself to the Documents and Settings folder on your system and then proceeds to search for specific file types like Microsoft Word Docs or Adobe PDFs. It applies an asymmetric encryption which requires both a public and private key to unlock. The public key is stored in the virus itself and is used to encrypt the files. The private key is hosted on the hacker’s server.
What happens if I get infected?
You will also see a timer counting down from 100 hours. If this reaches zero, your encrypted data will be deleted with a very slim chance of the files being recoverable. The preferred method of payment is in BitCoins – a digital currency. The pop-up window has instructions on how to submit the payment – usually through an online payment method like Green Dot – MoneyPak.
The good news is, once you submit the payment, you will receive a key you can enter to unlock your files. The hackers have said that they won’t re-infect systems, and network security companies have confirmed that so far, this has been the case.
While many up-to-date virus and security scanners will pick up CryptoLocker, most won’t be able to recover or decrypt files even if the malware itself is deleted. If you see the pop-up window, it’s probably too late.
How do I prevent CryptoLocker from infecting my systems?
Looking to learn more about CryptoLocker and how you can keep your systems safe from it? Contact us today.
|Master the hashtag on Facebook|
There are numerous trends related to the different social media services out there. One of the more popular being the hashtag. These tags have seen great success with Twitter users and social media platforms like Facebook also starting to support them. Because of this, many businesses are trying to use hashtags but are unsure as to how to effectively leverage them.
|5 ways to secure personal info|
If you are a small business owner or manager you are likely the person that everyone turns to when things are going well, and not so well. One problem you may face is a security breach, where private information is stolen or leaked. If this were to happen, you will likely be asked questions and maybe even held accountable. Therefore, it is advisable to take steps to ensure that the personal information in your systems is secure.
|All about Internet connections|
The Internet is one of the most important inventions of the century. It has allowed businesses to go global and connect to customers and other businesses in a way like never before. As a business owner, you likely have an Internet connection in your business. As your business and technology develops there will undoubtedly come a day when you need to upgrade or change your connection. But do you know the different types of connections available?
|Overview of Android 4.3|
The last week of July was a big one for Google. They introduced a new version of their popular 7 inch tablet and a new version of Android 4.3. This update turned out to not be a completely new version of Android but more of an update with some newer features. These features and updates, while minor, make improvements for tablets and phones.