Four Steps to Fight Ransomware!

If the WannaCry virus missed you, the next one might not.

If you missed the news (or saw the headlines but didn’t have time to check it out), there was a global hack attack of the ransomware variety the second week of May (2017). It struck 150 countries, thousands of companies and millions of computer users. The ransomware was called WannaCry, and you can learn about it in an article we wrote right after it happened.

Most of the computers affected were workplace computers; that is, the ransomware attacked companies, government agencies, universities and so on. In that regard, most of us were relatively safe, as far as our “home computers” or other connected devices not being attacked.

But that was this time.

Any good news?

There is plenty of bad news and that’s what’s been making the headlines. The good news is that you have an opportunity avoid being a victim of the next ransomware attack. Here are the top lessons we all need to learn.

1 — BE CAREFUL WHERE YOU CLICK!

How many times have you watched a video clip on YouTube or clicked on an ad to get more information. Probably thousands of times, with no problem. You got the video or information you wanted.

Well, you might load ransomware the same way, by clicking on a link to a video, website or document. But, you likely were fooled into thinking the link was from a trusted, safe or innocent source.

Have you ever gotten a pop-up message saying your computer is infected? Oftentimes, that link isn’t trustworthy, but you might click it out of concern. That’s how you might accidently download a ransomware virus. For the everyday Internet user, ransomware typically won’t suddenly show up on someone’s monitor with a scary message; in most instances, the computer user has inadvertently, accidentally or unknowingly triggered the malware attack.

That’s why it’s so important to think twice before you click on any link, especially at work.

2 — UPDATE YOUR ANTI-VIRUS PROGRAMS

Your computer hardware will generally work for a long time, like an old television, without failing. Our hardware—our physical computers— generally don’t break or crash without a cause. They simply get outdated.

However, it is your software that needs to be constantly updated, upgraded or changed now and then. Here’s what you need to keep in mind.

Computer viruses are software: they are malicious software programs, or malware. If malware gets into your system, it can and will do damage of some kind…the way their hacker designed it to do.

However, you can prevent hackers from getting in your computer by keeping your computer’s software defenses strong. Not only your anti-virus program, but all of your application programs too. Software vendors (Microsoft, Adobe, Oracle) routinely announce and provide software upgrades.

3 — UPDATE WINDOWS!

The brain of your computer is its operating system. In the WannaCry ransomware incident, only some versions of Microsoft Windows were struck. (If you had an Apple computer, you were safe.)

There’s a difference between updating Windows and upgrading it.

With updating, you maintain the version of Windows you’re currently using. In the past eight years, there have been four different versions: Windows 7 (2009), Windows 8 (2012), Windows 8.1(Windows 13), and the current Windows 10 (2015).

Microsoft provides updates to the different Windows versions regularly; however, they have stopped providing updates for older versions, such as Windows XP. Evidently, computers that use Windows 10 were safe from the WannaCry attack, automatically.

Amazingly, Microsoft had issued “patches” or fixes to previous versions of Windows just two months before the WannaCry attack. These patches are interim updates to fix any recent problems or address any potential or known threats. People who updated their Windows OS with the available patch were not vulnerable to the WannaCry attack!

4 — BACK UP YOUR FILES.

It’s very important “back up your” files, in computer-ese. We all have made a copy of a receipt or an important document as a backup, in case something happened to the original copy—backing up your files, for your protection in case of a computer disaster, is the same thing.

Yet, few people routinely back their files up. That’s a headache in the making.

And as an article in the Wall Street Journal (May 15, 2017) wisely pointed out, “Over time, a computer’s file system faces a growing chance of becoming corrupted and unreadable (any day). If that happens, you’ll be grateful you backed up (your files.)”

Here are the different options you have for backing up some or all of your files:

  • You can burn files to a CD if your computer has CD drive.
  • You can purchase an external drive to transfer your files to routinely.
  • USB flash drives (thumb drives) are very inexpensive and offer quick easy storage.
  • Backup software automates the processes of making copies of files to external drives.
  • The Cloud offers a variety of backup options.

By backing up your files, you have peace of mind that your most important digital files (software, documents, photos, spreadsheets) that are on your computer also exist in some other protected location. You can read our article with more information on these backup options.

We suggest using an automated online backup service like Carbonite.

Conclusion

If you follow these four-steps—watch where you click, update your software, update or upgrade Windows, and back up your files—you’ll make great strides in thwarting the attempts of hackers and avoid possibly getting caught in the next sweeping, ransomware attack.

Picture of <span>About The Author</span>Chris Parker

About The AuthorChris Parker

Chris Parker is the founder of WhatIsMyIPAddress.com, one of the world’s most popular websites for online privacy and security with over 13 million monthly visitors. He is also the host of the Easy Prey podcast, where he interviews experts and survivors to uncover the tactics behind scams, fraud, and digital manipulation. Chris is the author of Privacy Crisis: How to Maintain Your Privacy Without Becoming a Hermit, a practical guide to protecting personal information in today’s surveillance-driven world. His work has been featured on ABC News and numerous podcasts, making him a trusted voice on how to stay safe, secure, and private online.
Share Post:

INSIGHTS YOU

MAY ALSO LIKE

You play a role in preventing social engineering. So, just what is social engineering? It’s a vague term that’s used for online shenanigans and…

If you think that only your Internet Service Provider (ISP), such as Cox Cable or Verizon, knows your IP address, think again. (Your IP…

This post was moved over from an old blog of mine that I’ve since taken down. Several years ago I purchased an APC AP9630…

WHAT PEOPLE SAY

ABOUT CHRIS

DOWNLOAD CHRIS’ BOOK

PRIVACY CRISIS

DOWNLOAD YOUR FREE PDF, MP3, and workbook by entering your details below.

We respect your privacy. 

Don’t want to share your email?

Privacy Policy

This following document sets forth the Privacy Policy for this website.

Collection of your personal information

We collect Non-Personally Identifiable Information from visitors to this Website. Non-Personally Identifiable Information is information that cannot by itself be used to identify a particular person or entity, and may include your IP host address, pages viewed, browser type, Internet browsing and usage habits, advertisements that you click on, Internet Service Provider, domain name, the time/date of your visit to this Website, the referring URL and your computer’s operating system.

Free offers & opt-ins

Participation in providing your email address in return for an offer from this site is completely voluntary and the user therefore has a choice whether or not to disclose your information. You may unsubscribe at any time so that you will not receive future emails.

Sharing of your personal information

Your personal information that we collect as a result of you purchasing our products & services, will NOT be shared with any third party, nor will it be used for unsolicited email marketing or spam. We may send you occasional marketing material in relation to our design services.

What Information Do We Collect?

If you choose to correspond with us through email, we may retain the content of your email messages together with your email address and our responses.

Cookie Based Marketing

Some of our advertising campaigns may track users across different websites for the purpose of displaying advertising. We do not know which specific website are used in these campaigns, but you should assume tracking occurs, and if this is an issue you should turn-off third party cookies in your web browser.

How Do We Use Information We Collect from Cookies?

As you visit and browse Our Website, the Our Website uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security. Cookies, in conjunction with our web server log files or pixels, allow us to calculate the aggregate number of people visiting Our Website and which parts of the site are most popular.

This helps us gather feedback to constantly improve Our Website and better serve our clients. Cookies and pixels do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.

IP Addresses

P addresses are used by your computer every time you are connected to the Internet. Your IP address is a number that is used by computers on the network to identify your computer. IP addresses are automatically collected by our web server as part of demographic and profile data known as traffic data so that data (such as the Web pages you request) can be sent to you.

Sharing and Selling Information

We do not share, sell, lend or lease any of the information that uniquely identify a subscriber (such as email addresses or personal details) with anyone except to the extent it is necessary to process transactions or provide Services that you have requested.

How Can You Access and Correct Your Information?

You may request access to all your personally identifiable information that we collect online and maintain in our database by using our contact page form.

Changes to this Privacy Policy

We reserve the right to make amendments to this Privacy Policy at any time. If you have objections to the Privacy Policy, you should not access or use this website. You may contact us at any time with regards to this privacy policy.