Get Aligned!

Ransomware: the word on everyone’s lips right now. If you haven’t been hit, you no doubt will be on-edge until the perceived threat disappears. Unfortunately, the widespread infection of Wannacry has only highlighted how easily ransomware can be spread, and how fatal it can be to organisations. So, beyond security software and keeping your systems up-to-date, how can you ensure that your environment is safe? Employee education is the best and most reliable way to prevent malware; there will always be a new virus that will slip through even the tightest of network security, but if users are vigilant and aware, the odds of an infection are low. So what can your users look out for?

    • Emails from a genuine business or organisation such as Apple, Google, UPS, Amazon, high street banks, or HMRC that may or may not appear slightly “off”. Check the logos, the sender email address (not just the sender name), the colours, fonts, and spelling in the email. Do they seem legitimate? Are they asking you to click a link or download an attachment? If so, verify the link before you click by hovering over it with your mouse and check that the address is correct. If you’re not expecting an email or attachment from them or it is different to anything you have received previously, play it safe and don’t open it. Visit the site directly rather than clicking any links within the email.

 

    • Be wary of emails that are telling you that you have a tax refund, asking you to view a link or photo because it’s humorous, asking you to reset your password, or telling you to pay or view an invoice. Unless you are specifically expecting an email like this (i.e., you have just requested a password reset), double check the links and if in doubt, don’t open it.

 

    • Never run an attachment directly from an email if you’re unsure of its origins; save it to your desktop first.

 

    • Finally, at all times your use your common sense and discretion. Start with the assumption that the mail is malicious and work your way to confirming it is safe by visually validating the sender and links before clicking anything.

 

    • Although the main point of infection with Wannacry was through email, webpages can also be used to coax users into clicking on links or images in pop-up windows. Consider turning on pop-up and ad blockers for your organisation.

 

Ensure that all of your users are aware of the threat and are extra-vigilant at the moment especially, and exercise extreme caution when opening emails and browsing the web. Again, while we are all focused on the rampant spread of Wannacry right now, enforcing best practices amongst your users will help keep you safe, regardless of the threat “du jour.”

Back to List

Related Stories

Ransomware Defence for Dummies

Ransomware Defence for Dummies

The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative criminal enterprise…

Read Post

GDPR: 12 Steps to Take Now

GDPR: 12 Steps to Take Now

GDPR is only one year away, and the clock is ticking to make sure your business is compliant. While there are many similarities between the …

Read Post

IT Security: Are you being negligent?

IT Security: Are you being negligent?

Almost every day there is a data breach in the news. Companies like Yahoo, Linkedin, Adobe, JP MorganChase, and even a US voter database wit…

Read Post

Cyber Security Essentials for the Financial Sector

Cyber Security Essentials for the Financial Sector

Cyber threats are growing more sophisticated and dangerous on a daily basis, threatening to disrupt our interconnected global financial syst…

Read Post

In Or Out; Data Protection Laws Still Count

In Or Out; Data Protection Laws Still Count

As you now know, the UK public voted out in the EU referendum – it is a significant event in UK politics and perhaps the most important vote…

Read Post

Business Email Threat Report 2016

Business Email Threat Report 2016

Have you faced an email cyber-attack before? Do you feel prepared to take on new threats? A majority of businesses don’t have experience …

Read Post

Top 10 Security Tips For Remote And Mobile Working

Top 10 Security Tips For Remote And Mobile Working

There can’t be many businesses today that don’t use remote working to some extent throughout the working day. Even those without a cultu…

Read Post

Insider Threats - The Number One Security Risk

Insider Threats – The Number One Security Risk

While it’s important to shore up your cyber security defences against hackers and cyber criminals, what about planning for and preventing …

Read Post

Commercial Real Estate Owners Use High Performance Wireless To Differentiate

Commercial Real Estate Owners Use High Performance…

In the UK commercial real estate sector, value-adding strategies and technologies are a key theme for 2016.

Although UK commercial proper…

Read Post

Important Notification - Resurgence Of Crypto Virus

Important Notification – Resurgence Of Crypto Viru…

We’re continuing to see a resurgence in the business affecting virus called CryptoLocker, also known as CryptoWall.

The Crypto virus i…

Read Post