Information Security Tips: What is Ransomware and How to Prevent it

The concept behind ransomware, a well-known form of malicious software, is quite simple: Lock and encrypt a victim’s computer data, then demand a ransom to restore access. In many cases, the victim must pay the cybercriminal within a set amount of time or risk losing access forever. And since we’re dealing with criminals here, paying the ransom doesn’t ensure access will be restored.

Types of Ransomware

Ransomware can come in many shapes and sizes. Some variants may be more harmful than others, but they all have one thing in common: a ransom. The five types of ransomware are:

  • Crypto malware. This is a well-known form of ransomware and can cause a great deal of damage. One of the most familiar examples is the 2017 WannaCry ransomware attack, which targeted thousands of computers around the world and spread itself within corporate networks globally.
  • Lockers. This kind of ransomware is known for infecting your operating system to completely lock you out of your computer, making it impossible to access any of your files or applications.
  • Scareware. This is fake software that acts like an antivirus or a cleaning tool. Scareware often claims to have found issues on your computer, demanding money to resolve the issue. Some types of scareware lock your computer, while others flood your screen with annoying alerts and pop-up messages.
  • Doxware. Commonly referred to as leakware, doxware threatens to publish your stolen information online if you don’t pay the ransom. As more people store sensitive files and personal photos on their computers, it’s understandable that many individuals panic and pay the ransom when their files have been hijacked.
  • RaaS. Otherwise known as “Ransomware as a Service,” RaaS is a type of malware hosted anonymously by a hacker.

These criminals handle everything from distributing the ransomware and collecting payments to managing decryptors — software that restores data access — in exchange for their cut of the ransom.

Dos and don’ts of Ransomware

Ransomware is a profitable market for cybercriminals and can be difficult to stop. Prevention is the single most important aspect of protecting your personal data. To deter cybercriminals and help protect yourself from a ransomware attack, keep in mind these dos and don’ts:

  1. Do use security software. To help protect your data, install and use a trusted security suite that offers more than just antivirus features.
  2. Do keep your security software up to date. New ransomware variants appear on a regular basis, so having up-to-date internet security software will help protect you against cyberattacks.
  3. Do update your operating system and other software. Software updates frequently include patches for newly discovered security vulnerabilities that could be exploited by ransomware attackers.
  4. Don’t automatically open email attachments. Email is one of the main methods for delivering ransomware. Avoid opening emails and attachments from unfamiliar or untrusted sources.
  5. Do be wary of any email attachment that advises you to enable macros to view its content. Once enabled, macro malware can infect multiple files. Unless you are absolutely sure the email is genuine, from a trusted source, delete the email.
  6. Do back up important data to an external hard drive. Attackers can gain leverage over their victims by encrypting valuable files and making them inaccessible. If the victim has backup copies, the hacker no longer holds the upper hand. Backup files allow victims to restore their files once the infection has been cleaned up. Ensure that backups are appropriately protected or stored offline so that attackers can’t access them.
  7. Do use cloud services. This can help mitigate a ransomware infection, since many cloud services retain previous versions of files, allowing you to “roll back” to the unencrypted form.
  8. Don’t pay the ransom. You could be wondering, “But won’t I get my files back if I pay the ransom?” You might, but you might not. Sensing desperation, a cybercriminal could ask you to pay again and again, extorting money from you but never releasing your data.

Ransomware bullies make a living by preying on the innocent. With new ransomware variants popping up frequently, you want to do what you can to minimize your exposure. By following these simple dos and don’ts, you can help protect your computer data and personal information from ransomware.

Will 5G Work in Nigeria?

Last month, there was a lot of celebration (especially within the tech community) around the arrival of 5G in Nigeria, courtesy of MTN. The announcement implied that Nigeria is now on track to launch the 5G network commercially, joining other African countries such as Lesotho and South Africa. But is Nigeria ready for 5G? Before I answer that question, let me tell you a quick story.

VDT Boss, Company bags Outstanding Awards at Africa Digital Awards 2022

VDT Communications Limited bags Most Outstanding Broadband Service Provider of the Year award as tech industry experts meet to address challenges affecting Nigeria’s full participation in the evolving world of technology.

VDT bags Digital Enterprise Broadband Service Provider Award

VDT Communications Limited bags Digital Enterprise Broadband Service Provider award as tech industry experts meet to address challenges affecting Nigeria’s full participation in the evolving world of technology.

How can we help you?

Feel free to talk to our online representative at any time you please using our Live Chat system on our website.

“VDT is very proactive and I will definitely recommend VDT to anybody”

Olisemeka Omon
CIO, Leadway Insurance