Get a FREE Visa Assessment From An Experienced Immigration Attorney! Schedule a Use Your Brain! Read More »
Cybercriminals use a variety of attack methods to deliver ransomware to their Use Your Brain! Read More »
Get a FREE Visa Assessment From An Experienced Immigration Attorney!
Schedule a review to analyze your immigration needs and determine eligibility.
Cybercriminals use a variety of attack methods to deliver ransomware to their victims’ machines. Some of the most frequent include drive-by downloads, malicious URLs embedded in email messages that download ransomware, or attachments to email messages that infect the victims’ systems with ransomware. Often, these infections are the results of phishing attacks.
Intel Security believes that an open and integrated system best enables organizations to effectively block threats like ransomware. Our hybrid, integrated approach unites endpoint and cloud controls to deliver antimalware, data protection, and web security managed through a single, centralized platform. This reduces fragmentation, allows for security automation, and enhances our customers’ ability to combat ransomware attacks more effectively with less effort.
McAfee Threat Intelligence Exchange combines threat information sources and immediately notifies all other integrated products (including third-party products) to be aware of newly identified ransomware across endpoints, gateways, firewalls, and networks.
Furthermore, all of Intel Security’s products—including consumer products—leverage McAfee Global Threat Intelligence. This always-on, cloud-based threat intelligence service enables accurate protection against known and fast-emerging ransomware by providing threat determination and contextual reputation metrics.
- Back-up! Back-up! Back-up! Have a recovery system in place so a ransomware infection can’t destroy your personal data forever. It’s best to create two back-up copies: one to be stored in the cloud (remember to use a service that makes an automatic backup of your files) and one to store physically (portable hard drive, thumb drive, extra laptop, etc.). Disconnect these from your computer when you are done. Your back up copies will also come in handy should you accidentally delete a critical file or experience a hard drive failure.
- Use robust antivirus software to protect your system from ransomware. Do not switch off the ‘heuristic functions’ as these help the solution to catch samples of ransomware that have not yet been formally detected.
- Keep all the software on your computer up to date. When your operating system (OS) or applications release a new version, install it. And if the software offers the option of automatic updating, take it.
- Trust no one. Literally. Any account can be compromised and malicious links can be sent from the accounts of friends on social media, colleagues or an online gaming partner. Never open attachments in emails from someone you don’t know. Cybercriminals often distribute fake email messages that look very much like email notifications from an online store, a bank, the police, a court or a tax collection agency, luring recipients into clicking on a malicious link and releasing the malware into their system. This is called ‘phishing’. When your operating system (OS) or applications release a new version, install it. And if the software offers the option of automatic updating, take it.
- Enable the ‘Show file extensions’ option in the Windows settings on your computer. This will make it much easier to spot potentially malicious files. Stay away from file extensions like ‘.exe’, ‘.vbs’ and ‘.scr’. Scammers can use several extensions to disguise a malicious file as a video, photo, or document (like hot-chics.avi.exe or doc.scr).
- If you discover a rogue or unknown process on your machine, disconnect it immediately from the internet or other network connections (such as home Wi-Fi) — this will prevent the infection from spreading.