Email attachments can be incredibly useful for sharing files and documents quickly and easily....
iPoint Insights (blog)
CryptoLocker Virus
Related Insights
Direct Traffic vs. Organic Traffic: Understanding the Key Distinctions
When it comes to analyzing website traffic, two essential sources often come under the spotlight:...
Remote Backup disaster Recovery
Remote backup disaster recovery includes a few different moving pieces. The first is remote backups – this essentially means a company that provides networking services, such as iPoint Technologies, routinely makes copies of your company’s most significant data, and then stores those copies on a server that is located somewhere far away from your office. That way, if a disaster occurs – such as a wildfire, or one of your employees clicks on a suspicious link that downloads a ton of ransomware onto your servers, and suddenly you cannot access any business information unless you pay a huge ransom to strangers over the internet – your company’s information is safe and can be recovered! (Take that, fraudsters!)
ADA Compliance on Websites
In today's digital age, website accessibility has become a crucial aspect of ensuring inclusivity...
What is a Written Information Security Plan?
A Written Information Security Plan (WISP) is a comprehensive document that outlines an...
When to Hire Network Consulting Services
Pretty much every business has a network, whether or not they know it! However, not every business...
CryptoLocker Virus on the Rise
The CryptoLocker Virus saw a 50% increase in 2015 and shows no signs of slowing down. Experts found over 58% of corporate PC’s had a malware infection attempted. The ransomware trojan is malware that effects access to your computer and demands users to pay a ransom for the restriction to be removed. This trojan is a malicious computer program that persuades users to install it by appearing to be routine or helpful. First reported in 2013, it targets computers running windows. CrytoLocker is propagated via infected email attachments, it displays a message offering to decrypt the data being held hostage via a prepaid cash voucher or bitcoin payment by a specific deadline. The monetary demand can range in price from $200 to 5,000 for an individual PC. The virus then saves itself to a folder and adds a registry key to run every time the computer starts up.
How to avoid the CryptoLocker Virus.
- It is always recommended to have a data back up system or a copy of your files.
- Be wary of emails from senders that aren’t familiar, especially with attachments.
- Train employees what to watch for and be alert of potential viruses.
- When in doubt, do not open suspect attachments.
- Establish stronger security processes.
What to do if infected by the CrytoLocker Virus
- Do not pay the ransom! There is no guarantee your computer will be released once ransom is paid. It will also propagate the virus and monies paid to online criminals.
- Unplug your machine right away. Make sure it is disconnected from the internet, you might be able to save some files from being encrypted.
- Take your PC to a local trusted computer consultant or IT Provider.