Tag Archives: protection


Top 6 Ransomware Defense Strategies

June 5, 2018
Web Admin
, , ,
No Comments


  1. Train your Users and Test their Knowledge
    Since ransomware infections often come through links and attachments inside emails, or from a website
    or web application, train your users how to recognize phishing attacks and suspicious links and
    attachments. Training is only part of the story. Admins must also make sure to regularly test their users
    with simulated phishing attacks to ensure that your users have been properly conditioned to resist these
  2. Monitor your Network
    Diligently monitor your network by analyzing your logs, clearing out alerts, and processing potential
    threat feeds. If the infection is detected quickly and the workstation is disabled immediately, you can
    recover the data within 24 hours, and often in as quickly as five minutes. Organizations should constantly
    update the operating system and other software on their systems with the latest patches. Unpatched
    vulnerabilities in operating systems and software are a common entry point for malware.
  3. Maintain Robust Backup and Disaster Recovery
    The ultimate safety net for ransomware defense is a robust data protection and disaster recovery
    solution. Implement a backup strategy that fully supports organizations with multiple types of data, files,
    and systems to protect. Not all solutions are created equal, but enterprise-grade backup and disaster
    recovery solutions preserve a complete version history, which is crucial to being able to recover from any
  4. Commercial Grade Anti-Virus Protection
    The best way to steer clear of viruses and malware is to use an industry-leading anti-virus software
    solution. There are many types out there, and they don’t have to break the bank, but having a superior
    level of defense will go a long way. On your anti-virus software, enable the auto update, auto-protect, and
    personal firewall features to ensure you always have protection in the background that is continually
  5. Lock Down Suspicious Email Attachments
    Organizations may also want to install advanced email spam filtering which will block email messages
    with attachments from suspicious sources. Admins can filter executable attachments in emails based on
    the file extensions (e.g., block emails sent with “.EXE” attachments). Admins should also disable macros
    embedded within attachments and re-enable the display to full file extensions which makes it way easier
    to spot suspicious files
  6. Have an Incident Response Plan
    How you’ve prepared will determine how quickly you are able to restore your company’s data and get
    systems functioning again. This starts with a well-designed plan that is understood by the entire team.
    Practice executing the plan to ensure you are able to get systems back online in the expected timeframe.
    The practice will also give your team the confidence to perform flawlessly when the need arises.

We have seen many examples of companies that have been infected by Ransomware and some that have lost all of their data, and a few that have been able to recover.  Those that recovered were lucky enough to have had a unattached backup copy somewhere.  It was a stale backup and 6 months old, but it was something.  A better answer to it would have been to adhered to the 6 defense strategies.

If you are in need of help getting your strategies in line, please give us a call at 702.430.1849.  You can also contact us by clicking here!

cyber security image

Fireball Adware – How to protect yourself

June 2, 2017
Web Admin
, , ,
No Comments

Malware Protection

The latest adware and malware on the market is what looks like a Chinese product called “Fireball” and has infected about 250 million browsers or 20 percent of the corporate networks around the world.  Several computer security companies have classified the infection as malware, but according to a Chinese digital marketing firm it is a research tool.

The danger is that it is exposing a great deal of your privacy information along with installing other unwanted plugins to your browsers.  It is all in an effort to boost advertising payments for the companies involved in releasing it.  For you, it is a dangerous software and allows others to gather information about you without you knowing.

From an overall security aspect, it is really dangerous and you or your IT department should find a way to protect you from it.  One very strong and prominent, but easy tool is from a company called Malwarebytes.  They have been around a long time and cleared millions of infected computers of malware.  We use them exclusively here at Covered Data.  If you are interested in a free trial of the latest release, please let us know.  We will send you a download link and the 30 day keys, with only a follow email from us about your thoughts on it.

Stay safe.


[contact-form-7 id=”325″ title=”Consultation Inquiry”]

Layout mode
Predefined Skins
Patterns Background
Images Background