October is internationally recognized as Cyber Security Awareness Month – and Halloween of course!
Reduce the chance of you getting hit by a cyberattack by limiting your internet footprint!
2021 has been a year for ransomware – a type of malware that holds a computer ‘ransom’ by encrypting it making it unusable.
https://illinois.touro.edu/news/the-10-biggest-ransomware-attacks-of-2021.php
Once a system is compromised, an attacker will display a message on the screen similar to the one below. This message typically explains what happened to the system as well as a way to get it back to normal…
Attackers demand a certain amount of Bitcoin, or other cryptocurrencies, to ‘unlock’ the system. Cryptocurrencies like Bitcoin are decentralized, meaning that there is no central authority controlling it. Instead, it relies on a technology called the blockchain to initiate all transactions. Transactions on a decentralized platform enable security, privacy, and some anonymity. This is good for the average person as well as for attackers.
Like most cyber attacks, ransomware typically starts with an attacker poking systems on the Internet to gain an understanding of a target. This is called reconnaissance. Attackers usually target high-profile individuals, companies, or people who may be vulnerable to such an attack. They will then use what information they find to attack their target!
For example, if you happen to share a vacation photo on your social media page while you are on vacation, this signals to the world that you are not home. If you post about your recently deceased dog, an attacker can start to build rapport with you by empathizing through messages and start to collect data points on you for their attack – i.e., your dog’s name might be one of your security answers set up on your banking profile…
Knowing this then…
If an attacker can’t find your information, you are less likely to be a targeted!
Here are 3 ways you can protect yourself against a cyberattack:
Remember, everything you do on the Internet can be tracked and used for malicious purposes. To quote one of my favorite tech professionals: “Distrust, Verify, and Stay Suspicious” ~ Eli the Computer Guy.
Until next time, take care and God Bless!
Protect yourself from … well yourself … and ransomware by backing up your data.
Here are some tips in case you encounter a ransomware message: