October 23, 2013 No Comments-
The ‘CryptoLocker’ virus is an example of ransomware that is currently receiving a lot of attention. Employing AES encryption with a 2048-bit key, the encryption is much too strong for anyone to be able to decrypt encrypted files without access to the right key. Users risk infection by opening unknown email attachments or by unknowingly already having a certain botnet client on the system.
What can you do?
We do not recommend paying the ransom. This will reinforce ransomware as a viable business model for the perpetrators, and will add to the problem in the long run. The most effective action against this kind of malware is to make sure you are not infected in the first place. Reduce the risk by:
For all practical purposes, having files encrypted by ransomware should be regarded as a total loss of the system. The good news is that sensible precautions and backup routines will help you be prepared for such an event and have you back up and running again without too much trouble.
Looking for an easy to use business backup solution try Norman SecureBackup:
Automatic backup process and with support for file revision history to help you avoid a possibly disastrous loss of data.
Looking for an easy to use solution for private use try Norman Online Backup:
Know that your files are always safe even if your computer crashes. You can also recover documents you deleted by mistake up to 30 days and access the previous versions of a file you’ve been working on.
Made up of various contributors' opinions and insights - the power of the collective.
Norman Safeground Blogs Archive