Avoiding
Ransomware

It’s a frightening reality that the ransomware industry is configured just like sectors of the real economy, with producers, resellers, customers and, because it’s a criminal business, victims. It’s this organised nature of ransomware that makes it so difficult to eradicate.

Thinking of eradication is probably not the most effective approach. Just like the infamous “war on drugs”, a more sober way of tackling the dangers of ransomware is to avoid it as much as possible. A sort of “just say no to ransomware” way of protection.

Ransomware readiness: A checklist
Sophisticated bad actor 4IR Tech such as ransomware infiltrate the computer and IT systems of companies and luckily less often, that of individuals, by gaining access through unprotected digital doors.

According to Pieter Rossouw from the IT company Invisible Solutions, it is almost impossible to avoid paying ransomware fees, usually in BitCoin, for the code to release captured files once your systems have been infected.

Sophisticated bad actor 4IR Tech such as ransomware infiltrate the computer and IT systems of companies and luckily less often, that of individuals, by gaining access through unprotected digital doors.

  • Keep your software up to date. Ransomware software tries to exploit software vulnerabilities, so your first step to a secure network is to always use the latest software.

  • Be aware. Make sure all personnel avoid clicking on untrusted emails and other links, which includes not visiting suspicious websites. The IT team can control some of these utilities, for instance using software to scan incoming emails for unwanted links. Facilitate staff training by experts to create a vigilant culture within the organisation.

  • Ask a reputable cyber security company to do penetration testing on your system. In other words, try to hack yourself before criminals do.

  • Utilise the latest firewall and anti-virus software as another important security layer, along with intrusion detection systems managed outside of the organisation.

  • Back up all files, or if that is not possible, back up the most important files daily and store these files physically in a secure location outside the organisation, so that the backups are not accessible via any network.

  • Think like a criminal and try to work out your own approach to security, versus that of a bad actor.