Archives - Ransomware


Test that your backups are working properly

Backing up your data is important, but only if it’s being backed up correctly. If the backups are failing, you won’t be able to retrieve your documents, and you will have taken that precaution in vain. Test that your backups are working every so often by retrieving and opening a file. That way, if you […]

How ransomware works

Ransomware identifies the drives on an infected system and begins to encrypt the files within each drive. Ransomware generally adds an extension to the encrypted files, such as .aaa, .micro, .encrypted, .ttt, .xyz, .zzz, .locky, .crypt, .cryptolocker, .vault, or .petya, to show that the files have been encrypted—the file extension used is unique to the […]

Watch for ransomware delivery via phishing email

Ransomware is commonly delivered through phishing emails or via “drive-by downloads.” Phishing emails often appear as though they have been sent from a legitimate organization or someone known to the victim and entice the user to click on a malicious link or open a malicious attachment. A “drive-by download” is a program that is automatically […]

Back up your valuable data

Protect your valuable work, music, photos and other digital information by making an electronic copy and storing it safely. If you have a copy of your data and your device falls victim to ransomware, you will be able to restore the data from a backup. Use the 3-2-1 rule as a guide to backing up […]

Follow the 3-2-1 backup rule by getting an external HDD

Catastrophic incidents and ransomware can leave you without access to important data. Back up everything according to the 3-2-1 rule. That is, have at least three copies of the data, two of which should be stored on different types of media, and one located elsewhere. Use an external HDD for the local backup.

How does ransomware work?

Ransomware detects the drives on an system that is infected and starts encrypting the files within those drives. Ransomware usually adds an extension to the encrypted files, such as .aaa, .micro, .encrypted, .xyz, .locky, .crypt, .cryptolocker, .vault, or .petya, to show that the files have been encrypted — the file extension used is unique to […]