E-Mail-Sicherheit 2018 – ein Lagebericht
Informationen zur aktuellen Bedrohungslage, zu fehleranfälligen Schutzmechanismen und zu menschlichem Versagen – und wie eine Cyber Resilience Strategie Sie vor Cyber Angriffen schützt.
Human error is one of the leading barriers to effective cybersecurity. Casual mistakes can lead to career-threatening results. Putting the right technology in place to improve your cybersecurity is important. However, an educated workforce that’s aware of the threats and knows how to prevent them is the last piece of the puzzle.
You can teach employees what they need to know to keep your organization secure, and we’re here to help.
As part of Cybersecurity Awareness Month in October, we’re bringing you a weekly series on common threats to strengthen your cyber resilience strategy.
This week, we’re tackling the issue of how to avoid ransomware. You can learn about other similar threats—and how to prevent ransomware from holding your organization hostage by downloading our cybersecurity awareness training kit.
What you should know about ransomware
Ransomware is a form of malicious software (or malware) that, once it’s taken over your computer, threatens you with harm, usually by denying you access to your data.
The attacker demands a ransom from the victim, promising — not always truthfully — to restore access to the data upon payment.
How to safeguard against ransomware
As with all threats, prevention is key. This is especially true for threats as damaging as ransomware.
• Backup your important files regularly.
• Consider using the 3-2-1 rule: Make three backup copies, store in at least two locations, with at least one offline copy.
• Use a vetted cloud storage service to store an archive of your files. You can try to restore your files from backup in the event of a ransomware infection.
• Install and use an up-to-date antivirus solution.
• Don’t click links or open attachments on emails from people you don’t know or companies you don’t do business with.
• Make sure your software is up-to-date to avoid exploits.
• When browsing the Internet, use a vetted browser which stops exploit kits, blocks pop-ups, and blocks malicious URLs.
Subscribe to our blog to keep up to date with the latest cybersecurity news, information, tips and analysis.
Get all the latest news, tips and articles delivered right to your inbox
You will receive an email shortly