How can you protect your business from cryptoviruses?
There are many different kinds of malware. They come and go, posing a serious threat to individuals and businesses alike. What are the associated risks, and how can you protect yourself against them? All our advice on the use of corporate backups is available here.
A cyber threat on the rise
What is a cryptovirus?
Cryptoviruses, also known as crypto-lockers, are malware: Trojan horse-type malicious software. It "disguises" itself in your computer environment. Once in, it encrypts your user data using a secret key: an unlock code known only to the hacker.
Blackmail with a key
Having taken your data, your peripheral device and sometimes your business software hostage, the virus demands a ransom. A warning message appears, starting a countdown. You are given a deadline, usually between 72 and 100 hours, to make payment. Once this time has elapsed, the ransom increases.
Distribution channels
Cryptoviruses infect your personal peripherals or your company's IS (Information System) through any form of disguised intrusion. Most often, these are infected e-mails, such as fake invoices or CVs (Curriculum Vitae). Let's say your company is in the recruitment phase: you receive a certain number of CVs every day. By clicking on one of them, you may unwittingly activate the virus.
The latest news
Over the past ten months, this form of cyber attack has intensified. Until now, it has mainly affected private individuals, but it is now spreading to businesses. Larger groups, better equipped in terms of cybersecurity, are more likely to escape. Small and medium-sized businesses, on the other hand, are in the front line.
How can you protect yourself?
Get out of reach
If you haven't backed up your data, you'll be at the mercy of these unscrupulous cyber pirates, who will demand astronomical sums from you. Your business will be temporarily suspended as a result of the inaccessibility of your working tools. And to get things moving again, you'll be tempted to give in to their blackmail.
Go incremental
If, on the other hand, you've planned ahead, the inconvenience will be less: you'll be starting from your previous version of backed-up data. That's why versioning is crucial: it's all about backing up incrementally. From one version to the next, your user information and business software are updated. So, in the event of an incident, you have a history of your various versions aggregated together.
Versioning becomes legion
Backup vendors are well aware of this challenge. Between January and April 2016, the publisher Neobe counted as many data restorations in four months as in the whole of 2015. This testifies to the growth of the phenomenon. So much so that Neobe is now making all its customers aware of the versioning method.
Choose the right tool
Software that makes life easier
When choosing a backup solution, it's important to consider how easy it is to use. If you have to manually remind yourself every x number of months to activate the backup, it's a hassle and a risk of forgetfulness. On the other hand, a solution that engages the backup by itself reassures you without taking up your time or energy. With Neobe, you choose the frequency of automatic backups. As soon as the system detects that something is available, such as access to your external hard disk, it starts. A smart way to manage continuous backups.
Software compatible with your other work tools
Depending on your operating system - Windows, Mac OS or Linux - certain solutions may be more or less suitable. Check the tool's compatibility and performance in relation to your environment. The latest version of Neobe software is cross-platform, offering the same functionality and quality of service, whatever the operating system.
Software to cover your specific needs
The question of compatibility is all the more important as malware differs from one environment to another. As a result, a software vendor dedicated to a particular environment will not necessarily have the right tools for you. Some ransomware, such as CryptoLocker or CryptoWall, evolves on Windows and Android, while on Linux it's other malware you'll need to guard against.
Cryptoviruses, like all existing malware, are powerful. While you need to protect yourself against them with effective antivirus software, you shouldn't stop there. It's the security of continuing to have access to your data elsewhere that will really put you beyond the reach of these cyber attacks. Automated versioning solutions can help you do just that, while also boosting your operational efficiency.