The WannaCry Ransomware is a Reminder to Get Serious About Security

WannaCry Ransomware Attack

Ransomware is the word on everyone’s lips this week, following the massive WannaCry ransomware attack which spread quickly all over the world. Security experts estimate that over 200 000 systems across 150 countries were affected by the attack, in which hackers took advantage of a weakness in Microsoft’s Windows operating system to block any access to a computer system until a ‘ransom’ is paid in order to unlock the system again.

Investigations into the massive hack are still unfolding, but current thinking is that the attack originated in North Korea and made use of a set of top secret National Security Agency tools that were stolen and sold last year.

The repercussions of such a huge ransomware attack are a major issue for security providers and are likely to bring renewed scrutiny to the sector. Systems will be tightened, but over time it’s inevitable that consumers lose their security focus and get lazy with protecting their data.

It’s in our best interest as online security providers to keep security top of mind for their customers and encourage our users to take basic steps to secure their data. Chris Medeiros, CEO of CanadianCloudBackup notes that “the world got lucky with the WannaCry ransomware. A researcher was able to find the kill switch before it did more damage. Nevertheless, it just shows that we need to educate consumers to be far more vigilant about securing their data.

North Korea WannaCry Ransomware Attack

Encouraging consumers to take care of the basics helps to take a lot of pressure off online security services. If you’re running a white label security service, encourage your customers to begin with 4 SIMPLE SECURITY STEPS.

Refresh passwords: Despite the old-fashioned nature of passwords, they are still the first line of defence for your data. Make sure that you regularly update your passwords, choose passwords that are not too obviously associated with you (e.g your birthday and maiden name) and write them down

Make use of encryption: Encryption of data should be standard practice in today’s online environment: Scrambling your data is an incredibly effective way of protecting it. By some accounts, encrypted data is harder to access than data which has been deleted. Whatsapp runs strong encryption software on their messaging service, Signal is a popular app for securing text messages, and you can choose to add the encryption option on Facebook Messenger.

Enable Two-factor authentication: When you turn this on, then you add a vital layer of security to one of your most important and vulnerable access points: your email account. Whenever someone tries to sign in to your email account from a new device, a message gets delivered to a secondary device with a code that grants access to account.

Install HTTPS to your Browser: The Electronic Frontier Foundation developed a plug-in that ensures you are always accessing the most secure form of a website when you’re online, and are protected from surveillance and any form of hacking.

These simple steps can go a long way towards dramatically improving an individual’s security profile and guarding against most hacking that appears online.

Canadian CloudBackup data centres are the perfect base from which to offer clients secure server and home cloud backup, as well as disaster recovery options. By leveraging the power of the Acronis AnyData Engine delivers a complete and reliable service that backs up data from any source and recovers to any destination and system.

Almost a week after the ransomware attack first surfaced, it appears to have been largely contained, thanks to a few mistakes that the hackers made, according to Wired Magazine. Yet there is no doubt that your data is more valuable than ever, and that there are more and more criminals out to get it. Simple, clear-headed thinking is the best defensive weapon that you have to contain any threats and protect your data.

Backup and Infosec series provided courtesy of Canadian CloudBackup

By Jeremy Daniel

Kaylamatthews

What You Need to Know – IoT and Real-Time Operating Systems

Real-Time Operating Systems A real-time operating system, or real-time OS, appears to execute tasks while using a single processing core simultaneously.  However, what's really happening is that the tasks' response time is so fast that ...
Martin Mendelsohn

Of Rogues, Fear and Chicanery: The Colonial Pipeline Dilemma and CISO/CSO Priorities

The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...
Tesla Twitter

The Tesla Story The World Is Ignoring

The Tesla Story The World Is Ignoring Bugatti is one of the most recognized names among luxury supercars. After the founder Ettore Bugatti died, the company nearly disappeared in 1952. Until Italian businessman Romano Artioli ...
Tunio Zafer

The Evolution of Data File Sharing

Data File Sharing Whether due to a lack of time, need or simply because email started at such an advanced stage, digital data-transfer systems have not progressed as far as physical delivery system. Centuries ago, ...
Ransomware Hostage Prevention Tips

Ransomware Hostage Prevention Tips

Ransomware Prevention Tips (Updated: 09,24,2020) Ransomware can bring your business to its knees. Whether it comes as a system- or network-wide infection, it can do a severe damage to your company. Attacks are at a ...
Anita Raj

The Criticality of Data Governance in a Multi-cloud Environment

The Criticality of Data Governance Multi-cloud has emerged as an enterprise favorite in almost no time.  In fact, Security Boulevard  makes a reference to a Forrester Research Report which confirms that almost 86 percent of ...