Ransomware trojans like CrytoLocker, CryptoWall, and TorrentLocker emerged as a top threat to small and midsize organization networks. The malware, once installed and activated, encrypt data files, making them unreadable until a ransom is paid.
There are many well-known instances of ransom payments to foreign hackers, including two Massachusetts police departments in recent years.
Outgoing Network Traffic Protection
Everyone knows antivirus software blocks malware from getting into networks. If that fails, what’s next? An often overlooked answer is blocking the outgoing traffic from the malware to botnets on the Internet.
Two-way protection is better than one.
Terminal’s use of OpenDNS filtering technologies block many ransomware programs from connecting to the compromised domains and IP addresses used to activate them, so even when ransomware is installed, the chance of the program activating and encrypting data is greatly reduced.
USB Drive Backups Are Not Enough
Many believe local backups are adequate protection from Cryptolocker, and expect to restore data from their backup drive if they are hit with malware. This doesn’t always work, as Cryptolocker does encrypt backup files on an attached USB device.
Terminal’s customers have redundant backups, on an isolated local device and in the cloud, included with Datto’s backup solution. These locations are not reachable by the malware, and can be used to restore files lost for any reason.
Hackers know the methods IT companies use to protect their customers, and are always finding new ways to circumvent security controls.
At Terminal, staying current about the latest malware threats is a priority.
Check out our update about new ransomware threats like Locky, SamSam, and Maktub that require extra vigilance. Here at Terminal, our engineers continuously evaluate new technical solutions on the market to deliver the best possible protection for our customers.