Avoiding Ransomware Attacks


What is Ransomware: It’s a type of malware designed to encrypt files or lock the operating systems  data  by attackers  who demand a ransom payment to decrypt or unlock the files.

How it’s activated :

This malware ( Ransomware )  get’s executed when a  computer user is tricked or lured to click on an infected link  through  an e-mail attachment or  when  downloading a modified file  link, fake( Mimic) software drives sites while visiting a rogue website.  The targeted victims  get some very enticing leads that make them  have the  desired  to take the action suggested.

Some of the areas to be careful the ransomware malicious links may be found are;

  • Getting an embedded malicious link in an e-mail that is offering  cheap airfare ticket that you had not subscribed;
  • Having an e-mail that appears to mimic genuine and reliable sites like Google Chrome or Facebook  with invites to you as the recipient to click on an image or even a recommendation to do an update to their web browser through a link;
  • When searching online  you open a well-crafted website that mimics a legitimate website and prompts most  users to download  the mimic files cloned as genuine files to install an update which once downloaded locks the PC, Smart Phones or laptops.

How the hacker ransom or extort the victim.( Ransomware ransom )

The ransomware malware normally locks the device (laptop, desktop, or phone) and changes the login password thus preventing the user from accessing the infected device, also some types of  ransomware malware train can encrypt the files on your hard drive and infected the other networked machines. To gain access to the files, the hacker usually ransom the victim where they attach payment instructions  and mode of payment that demand  sending money in bitcoins. With bitcoins it’s  hard to trace the hacker yet does not also guarantee that the victim would gain access to their files by getting the decryption key.

To avoid becoming a victim of ransomware, users can follow these tips:

  • Always delete any suspicious e-mail.  Never open messages from unverified sources or from known sources that offer deals that sound too good to be true are most likely malicious.  When having some doubt, ensure you contact the alleged source by  calling them via phone or by using a known, public e-mail address to verify the message’s authenticity.
  • Please avoid clicking on unverified e-mail links or attachments. Most suspicious links may carry ransomware files.
  • Ensure you have an antivirus / malware detecting software, device on the network that can also do e-mail filtering   to stop malicious message from reaching your inbox.
  • Install and maintain up-to-date antivirus software. Keeping your operating system updated with the latest virus definitions will ensure that your security software can detect the latest malware variations.
  • Update all devices, software, and plug-ins on a regular basis. Check for operating system, software, and plug-in updates often — or, if possible, set up automatic updates — to minimize the likelihood of someone holding your computer or files for ransom.
  • Back up your files. Back up the files on your computer, laptop, or mobile devices frequently so you don’t have to pay the ransom to access locked files.

Looking for ransomware recovery services in Kenya and Africa? Contact   East African Data Handlers now for unrivalled support! Call 0711 051 000 

Contact us Now


    Add a Comment

    Your email address will not be published.

    You cannot copy content of this page

    Call Now Button