How to prevent Locky ransomware
How to prevent Locky ransomware
How to prevent Locky ransomware
Remember that preventing Locky and extortion-ware like it is simply a matter of user discipline and an awareness of how malware can be contracted. The first consideration for stopping infections is to maintain an up-to-date system. This includes operating system security patches and ensuring that you’re using the latest version of your browser; place browser settings to their highest that still allow access required and warn of hazardous ‘site content. Disallow all add-ons, plugins and extensions. Install a good firewall that will cover ALL routes – including remote and networking connections; set this to disallow communication on Tor and I2P networks (so that if a trojan does gain entry, it cannot communicate and execute), block unauthorized port use. Get the best security software possible that will carry out in-depth scans. For good measure, make backups as regularly as possible to external storage.
The next consideration is settings, or privilege. On a network of any size – family or business – do not use the Administrator log-in for general use, or stay logged-in for longer than necessary in this capacity. It’s safer to give the username/password to everyone who may need it with the instructions to log-off when a task is completed. Allow strictest Admin privileges that still enable the network to function (see the Microsoft website for more detail on this).
The easiest element of prevention is good working practice – though perhaps this is sometimes the most difficult to enforce or adhere to. Bear in mind the delivery routes mentioned above. In the case of the e-mail delivery threat, depending on a system, set ‘mail to highest security. Ensure that all users are aware of the risks of opening unsolicited ‘mail. Disallow ActiveX (macro) function for all Microsoft Office applications. Find a method to filter incoming containing attachments and preview if neccessary by left-clicking and viewing Source in Properties which will supply the body of the text and display any hidden attachments without actually opening the file (DO NOT preview in Print Preview, as this can execute some malware).
Stay organized and up-to-date – don’t let this current threat know your business!
Contact us now
If you’ve lost valuable, irreplaceable data or need Data Recovery Plan for your Oraganisation or business— We can save it! Call us now at +254 711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands, Kenya. Best of it, we have distributed offices all over East Africa and can easily get your device brought to us from anywhere in East Africa.
Also we have other services in data recovery for various devices; Hard Drives, Laptops, Desktops, Raid Systems, RAID / NAS / SAN , Servers, Memory Cards, Flash Drives, Databases, SSD Drives etc
East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.
All Categories
- Backup
- BUSINESS EMAIL COMPROMISE ATTACKS
- Cloud back up services in Kenya
- Cloud Computing
- Computer Forensics
- Cyber Attacks
- Data Loss
- Data Recovery
- Data Recovery Cost
- Data recovery in Nairobi
- Data recovery in South Sudan
- Data recovery in Uganda
- Data Recovery Kenya
- Data Recovery Rwanda
- Data RecoveryKenya
- Database Recovery
- Design
- Desktop Recovery
- DIGITAL FORENSIC LABORATORY(DFL)
- Digital Forensics
- Digital Forensics Kenya
- Digital Photo Data Recovery
- Email Data recovery
- File Data Recovery
- Hacking
- hardriver Recovery
- Laptop Data recovery
- Mobile Data recovery
- Network and Security Services
- Phone Data Recovery
- Raid Data recovery
- Raid Recovery In Kenya
- Ransomware
- Ransomware Attacks
- Ransomware Removal Services
- Server Recovery
- Services
- Solid State Drive Data Recovery
- Technology
- Uncategorized
- Virtual PBX Cloud Services
- Virus & Malwares
- WebHosting