How Not To Become A Ransomware Victim

Ransomware has proven to be very lucrative for cybercriminals, so it makes sense that these kinds of attacks are being aimed at online retailers.

“If online businesses don’t have good security and backup plans and are victimised by ransomware, the impact can be devastating,” said to Craig Young, security researcher for Tripwire.

“In some cases, ransomware victims do not gain access to their files even after paying the ransom. It’s much more effective to protect your business against infections than to take action after you’ve been attacked.”

computer virusYoung has identified the following five crucial steps online retailers can take to protect themselves from ransomware:

1. Stay up-to-date

Keep plug-in software, especially shopping carts and blogging components, up-to-date at all times. As soon as a patch for a software vulnerability becomes available, cybercriminals have the information they need to start exploiting any systems that have not yet been updated.

2. Avoid single point failure

Make sure Web servers are not the sole repository for the website’s source code, data and security certificates. Keeping this content in a source code revision tracking system ensures that a Web server does not become a single point of failure. In the event of a ransomware attack, the owner does not risk losing the intellectual property contained in the website source code.

3. Replicate

Regularly replicate data files and databases so that the system can be easily restored on a fresh server in the event of a cyberattack.

4. Go for a minimalist approach

Minimise the software applications and services on production Web servers; it should not be used as a workstation. Ideally, nothing should be stored in home directories except for basic configuration files. This limits the potential risk for data loss.

5. Back it up

Various online services like Amazon Glacier and Iron Mountain provide the ability to back up important data and can be used to recover it in the event of catastrophic loss. Alternately, the use of virtualised servers updated with snapshots of key data that occurs at regular intervals minimises the risk posed by cybercriminals.

How much do you know about hackers and viruses? Try our quiz!

Duncan Macrae

Duncan MacRae is former editor and now a contributor to TechWeekEurope. He previously edited Computer Business Review's print/digital magazines and CBR Online, as well as Arabian Computer News in the UAE.

Recent Posts

OpenAI’s Lightcap To Take On Expanded Role

OpenAI chief operating officer Brad Lightcap to oversee international expansion as company consolidates lead in…

15 hours ago

China Unveils Deep-Sea Cable-Cutting Device

Chinese researchers publish details on device that could wreak havoc on undersea communications cables in…

16 hours ago

Pat Gelsinger Joins Faith-Based Tech Company Gloo

Former Intel chief Gelsinger expands role at Gloo, becoming executive chairman and head of technology…

16 hours ago

MEPs Ramp Pressure For Second EU Chips Act

MEPs add to Commission pressure for second EU Chips Act amidst industry calls for renewed…

17 hours ago

Xiaomi Raises $5.5bn In Expanded Share Sale

Smartphone maker Xiaomi reportedly raises about $5.5bn in Hong Kong share sale as it invests…

17 hours ago

BYD Launches Rival To Tesla’s Model 3 At Half Price

BYD's Qin L EV sedan starts at about half the price of Tesla's Model 3,…

18 hours ago