SlideShare a Scribd company logo
Ransomware and Backups
Everyday Security
Caleb Rollins
What is Ransomware?
● Ransomware is a malicious classification of software that once on your
computer or other digital device will lock up user access to important files
such as photos, music, documents, and other irreplaceable files
● In some cases this software then threatens victims that their valuable
information will be destroyed if they do no pay often large ransoms
● Other times the software will threatened to delete critical files to your
computer’s operating system
● Often times attackers are just opportunistic and do not care if they attack
your personal or work computer
● NEVER pay the ransom, 1 in 5 of those that do pay up often find their files
remain encrypted
What is Ransomware?
"Cryptolocker ransomware" by Christiaan Colen is licensed under CC BY-SA 2.0
How important are Ransomware attacks?
● In 2017, ransomware resulted in $5
billion in losses, both in terms of
ransoms paid and spending and lost
time in recovering from attacks!
● 59% of ransomware attacks are due to
emails with malicious links or
attachments
● Ransoms are often upwards of $10,000
and because attackers often use
cryptocurrency their transactions are
intractable
"Locky ransomware: payment" by Christiaan Colen is licensed
under CC BY-SA 2.0
● According to the 2018 Global Threat
Intelligence Report from NTT Security,
ransomware volume was up 350%
How can I be prepared for a Ransomware
attack?
1. Have a dedicated antivirus or antimalware
service running on your devices that
regularly scans for malicious software
2. Be careful when reading emails and other
digital forms of communication
3. If you are a victim of a ransomware attack
and your data on a device is altered or
destroyed the only way to recover is if
you had regular backed up your data!
"Data Release Show" by Discos Konfort is licensed
under CC BY 2.0
The Cornerstones of Backing Up Your
Data (adapted from Stay Safe Online)
● Making identical copies of digital photos, music,
financial records, health records, contacts, or
any other personal information that can’t be
replaced
● Then, choose the appropriate hardware and its
accompanying software depending on your
technical needs
● Physically store the backup device of your
choice in a safe location, preferably in a remote
area
"Hard drive array" by Shanghai Daddy is licensed
under CC BY-NC-ND 2.0
Making Copies of Your Data
● Most modern day computers have some sort of backup software
installed so make sure to check your computer before purchasing
software
● Most backup software is advantageous because in addition to actually
copying files, it manage and organizes the times and dates that you
have backed up data to each memory device
● How often you use your computer and the amount of information that
your computer holds should be taken into account when setting a
backup schedule, but for most users, backing up data once a week is
always a good starting place
Choosing Hardware that will Hold Your Data?
● Hardware is the opposite of software, it is a tangible device that will talk
to your computer and hold the information you wish to backup
○ CDs, DVDs, and USB flash drives → these options are great for holding
small amounts of data such as your photos from one or two months
○ Hard Drives → physical platters that are read by a head (see photo on
next slide)
■ These are considered slower and sometimes unreliable due to
crashes
○ Solid State Disk (SSD) → most SSDs can support high amounts of
storage (some over 1 TB) and have lightning fast transfer speeds
■ Today, SSDs are the medium of choice by most industry
professionals for reliability and ease of use
Choosing Hardware that will Hold Your Data?
"Hard Disk Drive" by pobre.ch is licensed
under CC BY 2.0
"Intel SSD SSDSC2CT120A3" by
Laineema is licensed under CC BY 2.0
"Compact Disks" by indi.ca is licensed under
CC BY 2.0
What about Cloud Storage options?
● All cloud storage means is that your data will be stored on a large
server (computer connected to the internet) off site of your
office or home
● This is a good option because in the event of a natural disaster
your data could be on another part of the globe that is
unaffected
● Most cloud storage services either charge upfront to use their
service or charge after you exceed a set cap on file size
● Cloud storage removes the hassle with setup and
configuration of new hardware with your computer
● Convenient option that can be accessed on any computer around
the world as long as you know your login credentials
Popular Cloud Storage Options
● Google Drive
● Dropbox
● OneDrive
"Top 7 Best Cloud Storage Services in
2019 For Backing up Your Data" by
vinayaketx is licensed under CC BY 2.0
Safely Using and Storing Backup Hardware
● Understanding how to properly use and store you backup hardware of
choice is just as important as backing up your data in the first place
● More detailed information can be found on our webpage
● Hard drives → handle with care!
○ need to be in a climate controlled environment that ensures that
extreme levels of temperature or humidity are mitigated
● CDs and DVDs → avoid scratching
○ Avoid prolonged exposure to light and heat
○ Avoid putting excess weight on top of CDs and DVDs
● SSDs and other flash memory → most durable
○ When transferring data from computer you remember to eject before
removing from the USB port
Sources
● https://www.csoonline.com/article/3236183/what-is-ransomware-how-it-works-and-how-
to-remove-it.html
● https://cybersecurityventures.com/ransomware-damage-report-2017-part-2/
● https://www.comparitech.com/antivirus/ransomware-statistics/
● https://www.nttsecurity.com/docs/librariesprovider3/resources/gbl-ntt-security-2018-gtir-
summary-uea.pdf?sfvrsn=e8c7f625_4
● https://staysafeonline.org/stay-safe-online/online-safety-basics/back-it-up/
● https://www.oo-software.com/en/how-often-should-a-data-backup-be-made
● https://www.securedatarecovery.com/learn/how-does-a-flash-drive-work
● https://www.enterprisestorageforum.com/storage-hardware/flash-vs-ssd-storage-whats-
the-difference.html
● https://www.pacetechnical.com/properly-store-hard-drive/
● http://multimedia.haveinc.com/products/dvd-care.asp

More Related Content

What's hot

Digital Forensics Overview
Digital Forensics OverviewDigital Forensics Overview
Digital Forensics OverviewMathew Shelby
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
Pratik Gupta
 
Records Management Services
Records Management ServicesRecords Management Services
Records Management Services
WEL Associates, LLC
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ictodalyfer
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
jonspav
 
Anti forensic
Anti forensicAnti forensic
Anti forensicMilap Oza
 
Uc13.chapter.15
Uc13.chapter.15Uc13.chapter.15
Uc13.chapter.15
Irfan Ali Memon
 
Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017) Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017)
Mike Kleviansky
 

What's hot (8)

Digital Forensics Overview
Digital Forensics OverviewDigital Forensics Overview
Digital Forensics Overview
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Records Management Services
Records Management ServicesRecords Management Services
Records Management Services
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ict
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Uc13.chapter.15
Uc13.chapter.15Uc13.chapter.15
Uc13.chapter.15
 
Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017) Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017)
 

Similar to Ransomware and Backups

How to survive in the work from home era
How to survive in the work from home eraHow to survive in the work from home era
How to survive in the work from home era
Marian Marinov
 
Protecting Hosts
Protecting HostsProtecting Hosts
Protecting Hosts
primeteacher32
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
naterator
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
Khalil Jubran
 
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - EndpointsWebinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Storage Switzerland
 
Backup data
Backup data Backup data
Backup data
Zaibi Gondal
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
Procore Technologies
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
aytenewbelay1
 
Css- 2nd quarter.pptx
Css- 2nd quarter.pptxCss- 2nd quarter.pptx
Css- 2nd quarter.pptx
MaryGraceHeredero3
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security
Zack Fabro
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
ZAG Technical Services
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
Shanmugavel Sankaran
 
4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx
yasothamohankumar
 
ChodonKumar.pptx
ChodonKumar.pptxChodonKumar.pptx
ChodonKumar.pptx
AnSHiKa187943
 
26-170918023441.pptx
26-170918023441.pptx26-170918023441.pptx
26-170918023441.pptx
aravind Guru
 
26-170918023441 (1).pptx
26-170918023441 (1).pptx26-170918023441 (1).pptx
26-170918023441 (1).pptx
AnSHiKa187943
 

Similar to Ransomware and Backups (20)

How to survive in the work from home era
How to survive in the work from home eraHow to survive in the work from home era
How to survive in the work from home era
 
Protecting Hosts
Protecting HostsProtecting Hosts
Protecting Hosts
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - EndpointsWebinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
 
Backup data
Backup data Backup data
Backup data
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
 
Css- 2nd quarter.pptx
Css- 2nd quarter.pptxCss- 2nd quarter.pptx
Css- 2nd quarter.pptx
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
P3
P3P3
P3
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx
 
ChodonKumar.pptx
ChodonKumar.pptxChodonKumar.pptx
ChodonKumar.pptx
 
26-170918023441.pptx
26-170918023441.pptx26-170918023441.pptx
26-170918023441.pptx
 
26-170918023441 (1).pptx
26-170918023441 (1).pptx26-170918023441 (1).pptx
26-170918023441 (1).pptx
 

More from North Carolina State University

Biometrics in Security
Biometrics in SecurityBiometrics in Security
Biometrics in Security
North Carolina State University
 
Updating Operating Systems and Applications
Updating Operating Systems and ApplicationsUpdating Operating Systems and Applications
Updating Operating Systems and Applications
North Carolina State University
 
Strong Passwords
Strong PasswordsStrong Passwords
Phishing
PhishingPhishing
Scams
ScamsScams
Cookie
CookieCookie
Cookie note
Cookie noteCookie note
Intimate Partner Violence
Intimate Partner ViolenceIntimate Partner Violence
Intimate Partner Violence
North Carolina State University
 

More from North Carolina State University (8)

Biometrics in Security
Biometrics in SecurityBiometrics in Security
Biometrics in Security
 
Updating Operating Systems and Applications
Updating Operating Systems and ApplicationsUpdating Operating Systems and Applications
Updating Operating Systems and Applications
 
Strong Passwords
Strong PasswordsStrong Passwords
Strong Passwords
 
Phishing
PhishingPhishing
Phishing
 
Scams
ScamsScams
Scams
 
Cookie
CookieCookie
Cookie
 
Cookie note
Cookie noteCookie note
Cookie note
 
Intimate Partner Violence
Intimate Partner ViolenceIntimate Partner Violence
Intimate Partner Violence
 

Recently uploaded

可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 

Recently uploaded (20)

可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 

Ransomware and Backups

  • 1. Ransomware and Backups Everyday Security Caleb Rollins
  • 2. What is Ransomware? ● Ransomware is a malicious classification of software that once on your computer or other digital device will lock up user access to important files such as photos, music, documents, and other irreplaceable files ● In some cases this software then threatens victims that their valuable information will be destroyed if they do no pay often large ransoms ● Other times the software will threatened to delete critical files to your computer’s operating system ● Often times attackers are just opportunistic and do not care if they attack your personal or work computer ● NEVER pay the ransom, 1 in 5 of those that do pay up often find their files remain encrypted
  • 3. What is Ransomware? "Cryptolocker ransomware" by Christiaan Colen is licensed under CC BY-SA 2.0
  • 4. How important are Ransomware attacks? ● In 2017, ransomware resulted in $5 billion in losses, both in terms of ransoms paid and spending and lost time in recovering from attacks! ● 59% of ransomware attacks are due to emails with malicious links or attachments ● Ransoms are often upwards of $10,000 and because attackers often use cryptocurrency their transactions are intractable "Locky ransomware: payment" by Christiaan Colen is licensed under CC BY-SA 2.0 ● According to the 2018 Global Threat Intelligence Report from NTT Security, ransomware volume was up 350%
  • 5. How can I be prepared for a Ransomware attack? 1. Have a dedicated antivirus or antimalware service running on your devices that regularly scans for malicious software 2. Be careful when reading emails and other digital forms of communication 3. If you are a victim of a ransomware attack and your data on a device is altered or destroyed the only way to recover is if you had regular backed up your data! "Data Release Show" by Discos Konfort is licensed under CC BY 2.0
  • 6. The Cornerstones of Backing Up Your Data (adapted from Stay Safe Online) ● Making identical copies of digital photos, music, financial records, health records, contacts, or any other personal information that can’t be replaced ● Then, choose the appropriate hardware and its accompanying software depending on your technical needs ● Physically store the backup device of your choice in a safe location, preferably in a remote area "Hard drive array" by Shanghai Daddy is licensed under CC BY-NC-ND 2.0
  • 7. Making Copies of Your Data ● Most modern day computers have some sort of backup software installed so make sure to check your computer before purchasing software ● Most backup software is advantageous because in addition to actually copying files, it manage and organizes the times and dates that you have backed up data to each memory device ● How often you use your computer and the amount of information that your computer holds should be taken into account when setting a backup schedule, but for most users, backing up data once a week is always a good starting place
  • 8. Choosing Hardware that will Hold Your Data? ● Hardware is the opposite of software, it is a tangible device that will talk to your computer and hold the information you wish to backup ○ CDs, DVDs, and USB flash drives → these options are great for holding small amounts of data such as your photos from one or two months ○ Hard Drives → physical platters that are read by a head (see photo on next slide) ■ These are considered slower and sometimes unreliable due to crashes ○ Solid State Disk (SSD) → most SSDs can support high amounts of storage (some over 1 TB) and have lightning fast transfer speeds ■ Today, SSDs are the medium of choice by most industry professionals for reliability and ease of use
  • 9. Choosing Hardware that will Hold Your Data? "Hard Disk Drive" by pobre.ch is licensed under CC BY 2.0 "Intel SSD SSDSC2CT120A3" by Laineema is licensed under CC BY 2.0 "Compact Disks" by indi.ca is licensed under CC BY 2.0
  • 10. What about Cloud Storage options? ● All cloud storage means is that your data will be stored on a large server (computer connected to the internet) off site of your office or home ● This is a good option because in the event of a natural disaster your data could be on another part of the globe that is unaffected ● Most cloud storage services either charge upfront to use their service or charge after you exceed a set cap on file size ● Cloud storage removes the hassle with setup and configuration of new hardware with your computer ● Convenient option that can be accessed on any computer around the world as long as you know your login credentials Popular Cloud Storage Options ● Google Drive ● Dropbox ● OneDrive "Top 7 Best Cloud Storage Services in 2019 For Backing up Your Data" by vinayaketx is licensed under CC BY 2.0
  • 11. Safely Using and Storing Backup Hardware ● Understanding how to properly use and store you backup hardware of choice is just as important as backing up your data in the first place ● More detailed information can be found on our webpage ● Hard drives → handle with care! ○ need to be in a climate controlled environment that ensures that extreme levels of temperature or humidity are mitigated ● CDs and DVDs → avoid scratching ○ Avoid prolonged exposure to light and heat ○ Avoid putting excess weight on top of CDs and DVDs ● SSDs and other flash memory → most durable ○ When transferring data from computer you remember to eject before removing from the USB port
  • 12. Sources ● https://www.csoonline.com/article/3236183/what-is-ransomware-how-it-works-and-how- to-remove-it.html ● https://cybersecurityventures.com/ransomware-damage-report-2017-part-2/ ● https://www.comparitech.com/antivirus/ransomware-statistics/ ● https://www.nttsecurity.com/docs/librariesprovider3/resources/gbl-ntt-security-2018-gtir- summary-uea.pdf?sfvrsn=e8c7f625_4 ● https://staysafeonline.org/stay-safe-online/online-safety-basics/back-it-up/ ● https://www.oo-software.com/en/how-often-should-a-data-backup-be-made ● https://www.securedatarecovery.com/learn/how-does-a-flash-drive-work ● https://www.enterprisestorageforum.com/storage-hardware/flash-vs-ssd-storage-whats- the-difference.html ● https://www.pacetechnical.com/properly-store-hard-drive/ ● http://multimedia.haveinc.com/products/dvd-care.asp