{"id":929,"date":"2019-11-02T13:30:30","date_gmt":"2019-11-02T17:30:30","guid":{"rendered":"http:\/\/csanow.com\/?p=929"},"modified":"2019-11-02T22:35:52","modified_gmt":"2019-11-03T02:35:52","slug":"what-about-encryption-viruses","status":"publish","type":"post","link":"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/","title":{"rendered":"What About Encryption Viruses?"},"content":{"rendered":"<p>Recently, a client contacted me with the following question:<\/p>\n<p>Question: I have been working with renewing my liability insurance and the big topic\/concern with all the carriers is Ransomware. What is in place on my system to keep me safe on my end of this issue?<\/p>\n<p>The answer to this is multitudinous and I\u2019ll attempt in this article to answer it as best I can:<\/p>\n<ul>\n<li>The first part of this is understanding exactly what is \u201cransomware\u201d? The short answer to this is that ransomware is a type of malware that once it infects a computer it quickly looks for certain files with popular file extensions, i.e., .doc, .xls, .pdf, etc\u2026 in layman terms, MS Word, Excel, PDF files and most other popular file types. Once it finds these files the malware applies an encryption to them and changes, or adds, a new file extension to them. The encryption makes the file impossible to open or be used without a de-encryption key, which the person, or persons responsible for the malware will \u201csometimes\u201d provide to you <strong><em>IF<\/em><\/strong> you pay them money, usually in the form of bitcoin (an electronic, somewhat untraceable form of payment). This amount typically will start in the amount of $500 and can potentially go into the thousands of dollars!<\/li>\n<\/ul>\n<ul>\n<li>Question: How does one typically become infected with ransomware? Answer: The usual means of infection is via email. An email will arrive as an attachment; most likely as an .exe, or .js. The email will often come from a \u201cspoofed\u201d email account, i.e., it will appear to come from someone you know so you\u2019ll let your guard down and click to open the extension. Sometimes it will come as a spoofed email from UPS, FedEx, or some other common source as such. Or, it will have something in the subject line such as \u201cyou\u2019ve won a prize\u201d or something else that will attract you to it. While ransomware will most commonly arrive by email, it\u2019s not restricted to this delivery system. It could come in via Facebook or Messenger links and other social media platforms. Remember: the weakest link in computer security is\u2026 YOU! A good analogy is that you can have many locks on your front door, but if you open it up to let in a stranger, you put yourself at risk.<\/li>\n<\/ul>\n<ul>\n<li>Question: What do I do if I\u2019ve become a victim of a ransomware infection? Answer: My advice is that you DO NOT PAY THE RANSOM! When you pay them, it just continues to encourage the criminal to continue to infect people. If nobody paid, there would cease to be an incentive to the infection. Also, as I noted above, the criminal won\u2019t always provide you with a de-encryption key; leaving you out of money and still no access to your files!<\/li>\n<\/ul>\n<ul>\n<li>So, the next logical question is: How can I protect myself?<\/li>\n<\/ul>\n<p style=\"padding-left: 80px;\"><u>The first thing<\/u> I recommend is to turn on file extensions in your computer view options; this will allow you to see if a specific file on your computer, whether it be in an email as an attachment, or within your computer file manager, is an .exe (executable file), or is it a PDF or Word, Excel, or some other type of file. Keep this in mind: <em><b>ALMOST NEVER OPEN AN EXECUTABLE&nbsp;FILE THAT HAS COME IN YOUR EMAIL<\/b><\/em>! This includes, as noted above, a .js file (javascript).<\/p>\n<p style=\"padding-left: 80px;\">Secondly, you need to have backups of your files. I\u2019ve covered the many different types of backups in other postings on my website if you want to read those for a more in-depth understanding, so I\u2019ll be brief here. A good backup(s) is your best defense to an encryption virus. This should always include, <strong><em>at a minimum<\/em><\/strong>, a file level backup, both locally and in the cloud! An encryption virus will usually look for local storage to infect as well so this is why cloud backup is so important. This is the best type of protection from an encryption virus because it is completely isolated from your system. Further, if it did somehow become infected, the cloud backup service will have their own backup in place as well! For a standard consumer, this type of backup is relatively inexpensive. For a business, it can be more costly, but how much would it cost you to have your business crippled by an infection and NOT have a backup that can be used to restore your files? You may have some downtime, but it won\u2019t be a total loss!<\/p>\n<p style=\"padding-left: 80px;\"><u>Thirdly, make sure your firewall is turned on<\/u>. Typically, this is the default setting for your computer, but it never hurts to double check.<\/p>\n<p style=\"padding-left: 80px;\"><u>Fourth<\/u>: Have a good, up to date, antivirus installed on your computer.<\/p>\n<p>We, at CSA Tech Solutions can assist you with all the above. We have both antivirus and backup packages available that can be configured for your specific situation and environment. We can also provide managed services in which we are monitoring the health of your computer systems. While there are no guarantees that you\u2019ll never be infected, you can take the steps discussed above to lessen the damage that can come as a result of this infection.<\/p>\n<p>Please feel free to call us at (717) 354-4272 to discuss the ways that we can help protect you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, a client contacted me with the following question: Question: I have been working with renewing my liability insurance and the big topic\/concern with all the carriers is Ransomware. What is in place on my system to keep me safe on my end of this issue? The answer to this is multitudinous and I\u2019ll attempt [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":934,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8,5,9,7,6],"tags":[24,22,23],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What About Encryption Viruses? - CSA Tech Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What About Encryption Viruses?\" \/>\n<meta property=\"og:description\" content=\"Recently, a client contacted me with the following question:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/\" \/>\n<meta property=\"og:site_name\" content=\"CSA Tech Solutions\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/csatech1\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-02T17:30:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-03T02:35:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csanow.com\/wp-content\/uploads\/2019\/11\/cryptolocker2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"450\" \/>\n\t<meta property=\"og:image:height\" content=\"353\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@csatech1\" \/>\n<meta name=\"twitter:site\" content=\"@csatech1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/\",\"url\":\"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/\",\"name\":\"What About Encryption Viruses? - CSA Tech Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/csanow.com\/#website\"},\"datePublished\":\"2019-11-02T17:30:30+00:00\",\"dateModified\":\"2019-11-03T02:35:52+00:00\",\"author\":{\"@id\":\"https:\/\/csanow.com\/#\/schema\/person\/7df72f0514c27017b79d4c8a41fe9e2d\"},\"breadcrumb\":{\"@id\":\"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csanow.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What About Encryption Viruses?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csanow.com\/#website\",\"url\":\"https:\/\/csanow.com\/\",\"name\":\"CSA Tech Solutions\",\"description\":\"Service You Can Trust!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csanow.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/csanow.com\/#\/schema\/person\/7df72f0514c27017b79d4c8a41fe9e2d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csanow.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/105854fe7804d1094a15d85154bb7d9a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/105854fe7804d1094a15d85154bb7d9a?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/csanow.com\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What About Encryption Viruses? - CSA Tech Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/","og_locale":"en_US","og_type":"article","og_title":"What About Encryption Viruses?","og_description":"Recently, a client contacted me with the following question:","og_url":"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/","og_site_name":"CSA Tech Solutions","article_publisher":"http:\/\/facebook.com\/csatech1\/","article_published_time":"2019-11-02T17:30:30+00:00","article_modified_time":"2019-11-03T02:35:52+00:00","og_image":[{"width":450,"height":353,"url":"https:\/\/csanow.com\/wp-content\/uploads\/2019\/11\/cryptolocker2.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@csatech1","twitter_site":"@csatech1","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/","url":"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/","name":"What About Encryption Viruses? - CSA Tech Solutions","isPartOf":{"@id":"https:\/\/csanow.com\/#website"},"datePublished":"2019-11-02T17:30:30+00:00","dateModified":"2019-11-03T02:35:52+00:00","author":{"@id":"https:\/\/csanow.com\/#\/schema\/person\/7df72f0514c27017b79d4c8a41fe9e2d"},"breadcrumb":{"@id":"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csanow.com\/index.php\/2019\/11\/02\/what-about-encryption-viruses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csanow.com\/"},{"@type":"ListItem","position":2,"name":"What About Encryption Viruses?"}]},{"@type":"WebSite","@id":"https:\/\/csanow.com\/#website","url":"https:\/\/csanow.com\/","name":"CSA Tech Solutions","description":"Service You Can Trust!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csanow.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/csanow.com\/#\/schema\/person\/7df72f0514c27017b79d4c8a41fe9e2d","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csanow.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/105854fe7804d1094a15d85154bb7d9a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/105854fe7804d1094a15d85154bb7d9a?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/csanow.com\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/posts\/929"}],"collection":[{"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/comments?post=929"}],"version-history":[{"count":4,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/posts\/929\/revisions"}],"predecessor-version":[{"id":935,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/posts\/929\/revisions\/935"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/media\/934"}],"wp:attachment":[{"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/media?parent=929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/categories?post=929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/csanow.com\/index.php\/wp-json\/wp\/v2\/tags?post=929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}