{"id":27,"date":"2015-12-07T22:13:00","date_gmt":"2015-12-07T22:13:00","guid":{"rendered":""},"modified":"2017-01-27T13:45:53","modified_gmt":"2017-01-27T18:45:53","slug":"encryption-virus-protection","status":"publish","type":"post","link":"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/","title":{"rendered":"Encryption Virus Protection"},"content":{"rendered":"<p><span style=\"font-family: 'verdana' , sans-serif;\">One of the things I mentioned in my previous post was a reference to an &#8220;encryption&#8221; virus. Since it came up, let&#8217;s discuss what these types of virus&#8217;s are and ways in which you can protect yourself from these potentially devastating virus&#8217;s.<\/span><\/p>\n<p><span style=\"font-family: 'verdana' , sans-serif;\">An encryption type virus is a nasty piece of work. When this type of virus attacks, just<\/span><\/p>\n<figure id=\"attachment_85\" aria-describedby=\"caption-attachment-85\" style=\"width: 330px\" class=\"wp-caption alignright\"><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-85\" src=\"http:\/\/192.168.1.115\/wp-content\/uploads\/2017\/01\/Ransomeware-Pic-300x210.gif\" alt=\"\" width=\"330\" height=\"231\" srcset=\"https:\/\/csanow.com\/wp-content\/uploads\/2017\/01\/Ransomeware-Pic-300x210.gif 300w, https:\/\/csanow.com\/wp-content\/uploads\/2017\/01\/Ransomeware-Pic-230x161.gif 230w, https:\/\/csanow.com\/wp-content\/uploads\/2017\/01\/Ransomeware-Pic-350x245.gif 350w, https:\/\/csanow.com\/wp-content\/uploads\/2017\/01\/Ransomeware-Pic-480x336.gif 480w\" sizes=\"(max-width: 330px) 100vw, 330px\" \/><figcaption id=\"caption-attachment-85\" class=\"wp-caption-text\">Encryption Virus Example<\/figcaption><\/figure>\n<p><span style=\"font-family: 'verdana' , sans-serif;\">about any and every file on you computer and runs an encryption routine on it. If you attempt to open the file, you&#8217;ll only see\u00a0gibberish. Similar to this: \u00a0&#8220;2#2%99)mbtu$728&#8221; etc. You&#8217;ll get a pop up notice indicating that you&#8217;ve been infected and if you want access to your files, you&#8217;ll have to pay a ransom. (example screenshot shown below). When these types of infections first appeared they were somewhat easily fixed for those of us\u00a0<\/span><span style=\"font-family: 'verdana' , sans-serif;\">knowledgeable\u00a0<\/span><span style=\"font-family: 'verdana' , sans-serif;\">enough about the\u00a0operating systems inner workings. On Windows 7 and above there is a feature known as &#8220;Shadow Copy&#8221;. Once you disabled the actual file causing the encryption, you needed only to run the Shadow Copy restore utility to revert the file back to the previous version.<\/span><\/p>\n<p><span style=\"font-family: 'verdana' , sans-serif;\">But alas, the nefarious people creating these things aren&#8217;t long before they create a new, advanced version. Shortly after they realized there was a workaround, they updated the infection to first disable Shadow copy services on the system before it started to encrypt the files. Once they did that, you were &#8220;screwed&#8221;, you now only had three options to choose from;\u00a0<\/span><\/p>\n<ol>\n<li><span style=\"font-family: 'verdana' , sans-serif;\">Recover your files from a recent backup<\/span><\/li>\n<li><span style=\"font-family: 'verdana' , sans-serif;\">Pay the ransom and hopefully get the de-encyption key<\/span><\/li>\n<li><span style=\"font-family: 'verdana' , sans-serif;\">Move forward and accept that are your files are gone.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-family: 'verdana' , sans-serif;\">For a business, this last option is not acceptable. So hopefully they had a backup system in place to recover the files!<\/span><br \/>\n<span style=\"font-family: 'verdana' , sans-serif;\"><br \/>\n<\/span><span style=\"font-family: 'verdana' , sans-serif;\">So, how do you protect your self from these encryption infections? Is there anything else I can do besides having a backup system in place. The answer to that is YES, just please understand; these infections are dynamic, meaning the designers are constantly changing them. What can protect you today may not be able to protect you tomorrow. Take as many reasonable approaches you can.<\/span><br \/>\n<span style=\"font-family: 'verdana' , sans-serif;\"><br \/>\n<\/span><span style=\"font-family: 'verdana' , sans-serif;\">I&#8217;ll be discussing backup methods and tools in a future post.<\/span><\/p>\n<p><span style=\"font-family: 'verdana' , sans-serif;\">There is currently one tool that I&#8217;m aware of to help protect you from these encryption type infections (more are being developed I&#8217;m sure). Below is a link and a description provided by the publisher. Currently this tool is free. Take advantage of it!<\/span><br \/>\n<span style=\"font-family: 'verdana' , sans-serif;\"><br \/>\n<\/span><span style=\"font-family: 'verdana' , sans-serif;\">Happy Computing!<\/span><br \/>\n<span style=\"font-family: 'verdana' , sans-serif;\"><br \/>\n<\/span><span style=\"font-family: 'verdana' , sans-serif;\">Download Link for <a href=\"https:\/\/ransomfree.cybereason.com\/\" target=\"_blank\">Cyberreason here<\/a>) \u00a0There is a Free version and a paid Pro version. Please read about the differences and decide accordingly.<\/span><\/p>\n<p><span style=\"font-family: 'verdana' , sans-serif;\"><span style=\"color: #282828; line-height: 28.8px;\">Disclaimer: Any software you install due to a recommendation of our is your own responsibility. Please take all cautionary steps when installing software, even when it&#8217;s recommended by the best of us! We can not be held responsible for any damages.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the things I mentioned in my previous post was a reference to an &#8220;encryption&#8221; virus. Since it came up, let&#8217;s discuss what these types of virus&#8217;s are and ways in which you can protect yourself from these potentially devastating virus&#8217;s. An encryption type virus is a nasty piece of work. When this type [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":85,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Encryption Virus Protection - CSA Tech Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption Virus Protection - CSA Tech Solutions\" \/>\n<meta property=\"og:description\" content=\"One of the things I mentioned in my previous post was a reference to an &#8220;encryption&#8221; virus. Since it came up, let&#8217;s discuss what these types of virus&#8217;s are and ways in which you can protect yourself from these potentially devastating virus&#8217;s. An encryption type virus is a nasty piece of work. When this type [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"CSA Tech Solutions\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/csatech1\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-07T22:13:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-27T18:45:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csanow.com\/wp-content\/uploads\/2017\/01\/Ransomeware-Pic.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"508\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@csatech1\" \/>\n<meta name=\"twitter:site\" content=\"@csatech1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/\",\"url\":\"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/\",\"name\":\"Encryption Virus Protection - CSA Tech Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/csanow.com\/#website\"},\"datePublished\":\"2015-12-07T22:13:00+00:00\",\"dateModified\":\"2017-01-27T18:45:53+00:00\",\"author\":{\"@id\":\"https:\/\/csanow.com\/#\/schema\/person\/7df72f0514c27017b79d4c8a41fe9e2d\"},\"breadcrumb\":{\"@id\":\"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csanow.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption Virus Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csanow.com\/#website\",\"url\":\"https:\/\/csanow.com\/\",\"name\":\"CSA Tech Solutions\",\"description\":\"Service You Can Trust!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csanow.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/csanow.com\/#\/schema\/person\/7df72f0514c27017b79d4c8a41fe9e2d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csanow.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/105854fe7804d1094a15d85154bb7d9a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/105854fe7804d1094a15d85154bb7d9a?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/csanow.com\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encryption Virus Protection - CSA Tech Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/","og_locale":"en_US","og_type":"article","og_title":"Encryption Virus Protection - CSA Tech Solutions","og_description":"One of the things I mentioned in my previous post was a reference to an &#8220;encryption&#8221; virus. Since it came up, let&#8217;s discuss what these types of virus&#8217;s are and ways in which you can protect yourself from these potentially devastating virus&#8217;s. An encryption type virus is a nasty piece of work. When this type [&hellip;]","og_url":"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/","og_site_name":"CSA Tech Solutions","article_publisher":"http:\/\/facebook.com\/csatech1\/","article_published_time":"2015-12-07T22:13:00+00:00","article_modified_time":"2017-01-27T18:45:53+00:00","og_image":[{"width":508,"height":356,"url":"https:\/\/csanow.com\/wp-content\/uploads\/2017\/01\/Ransomeware-Pic.gif","type":"image\/gif"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@csatech1","twitter_site":"@csatech1","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/","url":"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/","name":"Encryption Virus Protection - CSA Tech Solutions","isPartOf":{"@id":"https:\/\/csanow.com\/#website"},"datePublished":"2015-12-07T22:13:00+00:00","dateModified":"2017-01-27T18:45:53+00:00","author":{"@id":"https:\/\/csanow.com\/#\/schema\/person\/7df72f0514c27017b79d4c8a41fe9e2d"},"breadcrumb":{"@id":"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csanow.com\/index.php\/2015\/12\/07\/encryption-virus-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csanow.com\/"},{"@type":"ListItem","position":2,"name":"Encryption Virus Protection"}]},{"@type":"WebSite","@id":"https:\/\/csanow.com\/#website","url":"https:\/\/csanow.com\/","name":"CSA Tech Solutions","description":"Service You Can Trust!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csanow.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/csanow.com\/#\/schema\/person\/7df72f0514c27017b79d4c8a41fe9e2d","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csanow.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/105854fe7804d1094a15d85154bb7d9a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/105854fe7804d1094a15d85154bb7d9a?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/csanow.com\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/posts\/27"}],"collection":[{"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/comments?post=27"}],"version-history":[{"count":5,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/posts\/27\/revisions"}],"predecessor-version":[{"id":109,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/posts\/27\/revisions\/109"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/media\/85"}],"wp:attachment":[{"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/media?parent=27"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/categories?post=27"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/tags?post=27"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}