• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
easy GDPR - we make compliance with GDPR easy

easyGDPR

We make implementing General Data Protection Regulation Easy

  • Home
  • Services
    • Software
      • Quick Check
      • Starter
      • Standard
      • Data Subject Requests
      • Sophos
    • IT Security
    • network checkup
    • SME digitization funding
    • Data protection consulting
      • Data protection
      • Cybersecurity
    • Training
      • Data protection
      • Cybersecurity
  • Partner
    • Resellerprogramm
    • Affiliate programm
  • GDPR
    • GDPR News
    • FAQ
    • GDPR Decisions
    • GDPR Fines
    • GDPR legal text
  • Shop
  • Contact
    • Contact
    • Newsletter registration
  • Login
    • Shop / Affiliate Program
    • easyGDPR Software
  • German
  • English

Prevent cyberattacks?

24/02/2021 by Maria Steindl-Schindler

Not every entrepreneur is aware of his responsibility when it comes to data security. We receive news in media reporting about ransomware attacks every day.

What is ransomware?

Prevent from cyberattacks with easyGDPR

Ransomware is malware that blocks your computer or encrypts data so you can no longer access your data. As soon as the malware is active, the perpetrators report and make ransom demands. Experts sometimes speak of an encryption trojan because data is no longer readable by users. The perpetrators blackmail the victims by making it clear that the blocked data will not released until a ransom payment has been made. These cybercriminals play with people’s fear and enrich themselves at peoples expense.

Different variants of ransomware.

There are two different variants of ransomware.

  • Screenlocker – These lock the screen or the whole PC.
  • File encrypters encrypt the data on the computer and take data (text files, important folders,…) into hostage.

In the meantime, attacks with screenlocker have become rare. Instead, encryption programs are increasingly used, which completely encrypt the data.

How can I capture possible ransomware?

The spread hardly differs from other malware. This software often gets on your computer via manipulated websites, spam emails or social networks. In addition, faked e-mails are sent with alleged reminders, invoices, etc., which are not recognized as fake by many users in time and are therefore opened. Behind this, is a file that does not contain any information but a malicious code that spreads to their computers.

How do you know you are affected by a ransomware attack?

Normally, the screen blocks or an extortion letter appears that can not be closed. However, there are also variants that remain undetected over a long period of time and spread during this time. The effects will then occur later and users can no longer remember when and where they captured the trojan.

How can you protect yourself from ransomware?

  • Updates: Update your operating system continuously. Also, make sure that any software that has been installed is updated as well.
  • Browser: Update your browser and enable browser protection, which protects you from infected scripts and possible downloads of malicious files.
  • Protection measures: Use a firewall such as Sophos to detect and block malware. Endpoint Protection also detects malware such as Trojans and completely isolates it.
  • Training: Remember to train your employees to respond correctly and know what needs to be considered. Especially in today’s world with increased HomeOffice work, you need to make sure that employees react properly. Especially since private computers are unlikely to have implemented the same security standards as your company devices. These can be missing updates, for example, or bypassed security mechanisms, because they are annoying or make the notebook slower, etc.
  • User account: Make sure that the admin account is truly reserved for IT technicians. User accounts have fewer rights. In the event of a ransomware attack, the malware will not be able to penetrate so deep into the system and, ideally, will not cause any damage at all.
  • Backup and risk analysis: Perform regular backups of your data so you can access it in the event of a disaster. Perform a risk assessment by asking yourself the following 4 questions:

1. If there is a cyber attack, what impact does it have on my business model?
2. How long can the company survive if suddenly everything breaks?
3. What costs will incur if the company is standing still?
4. Are there backups that can be used in a new environment to reinstate data?

Schindler IT-Solutions stands for data security and has been committed to this for more than 20 years. With security solutions to executive and employee training , to GDPR and the in-house developed easyGDPR software, the topic of data security is covered. Since 2020, the know-how is also offered to the austrian cybersecurity hotline of the WKO.

Category iconCybersecurity,  News

Primary Sidebar

IT-Security Whitepaper Downloaden
  • German
  • English
  • Data Protection Statement
  • Terms and Conditions
  • Imprint
  • Licence terms for easyGDPR
  • GDPR terms
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking "Accept", you consent to the use of ALL the cookies.
SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non Necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

functionality

Diese Art von Cookies erhöht die Benutzerfreundlichkeit unserer Website. Beispielsweise wird darin die von Ihnen ausgewählte Sprache gespeichert. Auch die Verfügbarkeit von Videostreams und sonstigem Inhalt kann von diesen Cookies abhängig sein. Wenn Sie diese Cookies ablehnen, ist die Benutzerfreundlichkeit eingeschränkt.

Save & Accept