How Not To Become A Ransomware Victim

Ransomware has proven to be very lucrative for cybercriminals, so it makes sense that these kinds of attacks are being aimed at online retailers.

“If online businesses don’t have good security and backup plans and are victimised by ransomware, the impact can be devastating,” said to Craig Young, security researcher for Tripwire.

“In some cases, ransomware victims do not gain access to their files even after paying the ransom. It’s much more effective to protect your business against infections than to take action after you’ve been attacked.”

Young has identified the following five crucial steps online retailers can take to protect themselves from ransomware:

1. Stay up-to-date

Keep plug-in software, especially shopping carts and blogging components, up-to-date at all times. As soon as a patch for a software vulnerability becomes available, cybercriminals have the information they need to start exploiting any systems that have not yet been updated.

2. Avoid single point failure

Make sure Web servers are not the sole repository for the website’s source code, data and security certificates. Keeping this content in a source code revision tracking system ensures that a Web server does not become a single point of failure. In the event of a ransomware attack, the owner does not risk losing the intellectual property contained in the website source code.

3. Replicate

Regularly replicate data files and databases so that the system can be easily restored on a fresh server in the event of a cyberattack.

4. Go for a minimalist approach

Minimise the software applications and services on production Web servers; it should not be used as a workstation. Ideally, nothing should be stored in home directories except for basic configuration files. This limits the potential risk for data loss.

5. Back it up

Various online services like Amazon Glacier and Iron Mountain provide the ability to back up important data and can be used to recover it in the event of catastrophic loss. Alternately, the use of virtualised servers updated with snapshots of key data that occurs at regular intervals minimises the risk posed by cybercriminals.

How much do you know about hackers and viruses? Try our quiz!

Duncan Macrae

Duncan MacRae is former editor and now a contributor to TechWeekEurope. He previously edited Computer Business Review's print/digital magazines and CBR Online, as well as Arabian Computer News in the UAE.

Recent Posts

Google Delays Removal Of Third-Party Cookies, Again

For third time Google delays phase-out of third-party Chrome cookies after pushback from industry and…

5 hours ago

Tesla Posts Biggest Revenue Drop Since 2012

Elon Musk firm touts cheaper EV models, as profits slump over 50 percent in the…

5 hours ago

Apple iPhone Q1 Sales In China Fall 19 Percent, Says Counterpoint

Bad news for Tim Cook, as Counterpoint records 19 percent fall in iPhone sales in…

9 hours ago

President Biden Signs TikTok Ban Or Divest Bill Into Law

TikTok pledges to challenge 'unconstitutional' US ban in the courts, after President Joe Biden signs…

11 hours ago