Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
June 2016
cstoncall.com
CRYPTOLOCKER RANSOMWARE IS ONE OF THE
BIGGEST SECURITY THREATS TO YOUR BUSINESS
Ransomware is software that infects a comp...
INSTALL ADVANCED ANTIVIRUS SOFTWARE
WITH BEHAVIORAL CAPABILITIES
Your first line of protection against ransomware is
behav...
GET END-USERS INVOLVED AND EDUCATED
Ransomware typically relies on “social engineering” to
successfully attack a system. P...
HAVE YOUR DATA PROTECTED WITH REGULAR
OFF-SITE BACKUPS
Safeguard your critical information by storing it offsite.
Look for...
BE RESTRICTIVE IN USER PROFILES
One of the easiest ways to protect your data is to restrict
user permissions on your netwo...
PATCH, PATCH, PATCH
Keep your network, OS and application
software current. Out of date applications
and operating systems...
KEEP CYBERTHIEVES OUT OF YOUR BUSINESS
Ransomware is a lucrative business for Cyberthieves — and it’s only
going to become...
Upcoming SlideShare
Loading in …5
×

5 Ways To Protect Your Business From Dangerous Malware

55 views

Published on

5 Ways To Protect Your Business From Dangerous Malware and Ransomware -- including the Cryptolocker Malware.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

5 Ways To Protect Your Business From Dangerous Malware

  1. 1. June 2016 cstoncall.com
  2. 2. CRYPTOLOCKER RANSOMWARE IS ONE OF THE BIGGEST SECURITY THREATS TO YOUR BUSINESS Ransomware is software that infects a computer and locks the user out of their own information until they pay a ransom. The effects of ransomware can be devastating. Users can permanently lose access to their operating systems. Sensitive data may be completely inaccessible. Work grinds to a standstill. This presentation shows ways that you can protect your data and your business. Combined Systems Technology 515-473-6163 info@cstoncall.com www.cstoncall.com
  3. 3. INSTALL ADVANCED ANTIVIRUS SOFTWARE WITH BEHAVIORAL CAPABILITIES Your first line of protection against ransomware is behavioral-detection antivirus software. This type of application watches a system for infections or suspicious events and warns users if it detects an abnormality or a threat. CST recommends a managed version of Symantec Endpoint Protection. Symantec Endpoint Protection provides multi-level protection against malware. The managed version sends email notifications to you and our engineers if an end- user launches viruses or malware. Contact us to learn how Symantec Endpoint Protection provides a better protection level than any other security product. Combined Systems Technology 515-473-6163 info@cstoncall.com www.cstoncall.com
  4. 4. GET END-USERS INVOLVED AND EDUCATED Ransomware typically relies on “social engineering” to successfully attack a system. People click on unknown email attachments or interact with non-reputable websites and suddenly an infection is spreading through the entire company’s system. Avoid these accidents by teaching users a simple concept: “Don’t open links you don’t know anything about.” End users MUST be educated regarding these common approaches so that they know a malicious attachment or link when they see one, and know what to do if they accidentally click something they shouldn’t have. CST engineers can provide coaching ands education for your end-users, contact us to learn more. Combined Systems Technology 515-473-6163 info@cstoncall.com www.cstoncall.com
  5. 5. HAVE YOUR DATA PROTECTED WITH REGULAR OFF-SITE BACKUPS Safeguard your critical information by storing it offsite. Look for a backup solution that stores data in the cloud so files are safe if there’s a ransomware attack on an internal network. Be sure to set these products to perform regular backups to make recovery quick and thorough. A USB hard drive connected to your server is not sufficient and will often be encrypted along with everything else hosted in the same network. CST provides a variety of cloud-based backup solutions to fit the backup requirements of all businesses. CST can provide a no-cost consultation to design the correct solution. Combined Systems Technology 515-473-6163 info@cstoncall.com www.cstoncall.com
  6. 6. BE RESTRICTIVE IN USER PROFILES One of the easiest ways to protect your data is to restrict user permissions on your network . Well-meaning employees can inadvertently open something containing malware triggers, but if users can’t run downloads, updates and installations, it’ll be harder for them to accidentally let an infection in. The network engineering team at CST can evaluate the user rights and permission of your data network to limit end-users activities on the network. Contact us for a no- cost initial evaluation to review your network’s design and security. Combined Systems Technology 515-473-6163 info@cstoncall.com www.cstoncall.com
  7. 7. PATCH, PATCH, PATCH Keep your network, OS and application software current. Out of date applications and operating systems are attractive bait for hungry attackers. Patching Microsoft and third-party applications will eliminate weak points. This is a good preventative defense against all attacks, not just ransomware. CST provides regularly scheduled preventive maintenance to insure that all patches and security updates are completed. Learn more about our preventive maintenance programs by contacting CST. Combined Systems Technology 515-473-6163 info@cstoncall.com www.cstoncall.com
  8. 8. KEEP CYBERTHIEVES OUT OF YOUR BUSINESS Ransomware is a lucrative business for Cyberthieves — and it’s only going to become more so as the source code becomes more readily available online. Make sure you have the right security measures in place to thwart attacks. Our own clients have been threatened by the worst malware – Cryptolocker. Our clients survived the attacks by partnering with the CST engineering team. Our engineering team provides a multi- level defense against some of the worst malware. Contact us for no-cost initial consultation to learn how CST protects networks and profits. Combined Systems Technology 515-473-6163 info@cstoncall.com www.cstoncall.com

×