10 Critical Steps to Survive a Ransomware Attack, Step 6: Restrict Access to File Shares (aka “Silo Your Data”)

Posted Posted in Ransomware, Security, Uncategorized

10 Critical Steps to Survive a Ransomware Attack, Step 6: Restrict Access to File Shares (aka “Silo Your Data”) Most small firms we work with have a single file repository on their network, and every staff member has full access to it, and all of its contents. This means that anyone, from the CEO all […]

10 Critical Steps to Survive a Ransomware Attack, Step 4: Configure Your Firewall to Filter OUTbound Traffic.

Posted Posted in Ransomware, Security, Uncategorized

A firewall is a type of security device that blocks network traffic to and from unauthorized sites, and allows traffic to authorized sites. Firewalls range from high end devices designed to protect the likes of Amazon and Facebook, down to SOHO (Small Office/Home Office) devices from Linksys. While there is a tremendous range of features […]

10 Critical Steps to Survive a Ransomware Attack, Step 3: Use a Web Content Filter to Limit Internet Access.

Posted Posted in Business Continuity, Ransomware, Security

If you and your staff don’t need¬†unfettered Internet access to do your job, don’t allow it. Period. Most of your employees do not need access to Facebook, Amazon, CNN, YouTube, and a majority of the websites they’re accessing every day. Every time you go online and access a website, you are increasing your exposure to […]

10 Critical Steps to Survive a Ransomware Attack, Step 2: Patch, Patch, Patch.

Posted Posted in Ransomware, Security, Uncategorized

What are software patches? Patches are fixes for “bugs,” or flaws in programs. While some people still like to say “computers don’t make mistakes,” one must remember that computers are designed, built, and programmed by humans… and humans certainly make mistakes. Software patches are created when a problem is found, and the author of the […]