COGEP International is an English-speaking professional services firm.

Ransomware: What is it? How can you protect yourself?

Ransomware: What is it? How can you protect yourself?

Cyber-attacks often make front-page news. At the heart of these attacks are ransomware assaults on company files. Let’s take a closer look at what they are, how they infiltrate our IT systems, and how to protect yourself.

Ransomware is a type of malicious software that encrypts files on a phone, computer, or server, then demands a ransom in exchange for the decryption key needed to recover the files. It effectively “takes hostages” and demands a ransom.

The term “ransomware” is a combination of “ransom” and “software”. In French, it is sometimes referred to as “rançongiciel”.

Ransomware can penetrate computer systems in various ways, including:

  1. Phishing”: you receive a seemingly legitimate email containing a malicious link or infected attachment. 
  2. Exploits”: hackers exploit known vulnerabilities (“Exploits”) in software or operating systems to install ransomware.
  3. Infected USB devices: like all computer viruses, ransomware can spread via infected USB devices.
  4. Poorly secured company networks: hackers gain access to a company network using social engineering techniques, vulnerabilities in network devices, and overly accessible computer racks.

In the face of these compromise techniques, there are best practices for significantly reducing the risk of ransomware infection:

  • Frequent updates

    Computers, tablets, and mobile phones need to be updated frequently.

  • Use of a good antivirus

    Installed and up-to-date, it protects against threats in real time.

  • Use a good anti-spam software

    It eliminates a large proportion of unsolicited emails (or spams). However, you should always be careful about the attachments you receive and only open those that you expect and that appear legitimate. Also beware of links to file-sharing sites.

  • Use of strong, regularly updated passwords

    Strong passwords (long and complex) can prevent “brute force” and “dictionary” password attacks. However, as time goes by, the risk of your password being compromised increases, so it’s important to change it regularly.

  • Perform safety tests

    Penetration tests or vulnerability assessments are used to identify and correct weak points in IT infrastructures.

  • Regular data backups

    On disconnected or non-rewritable external media; or in a secure cloud. Backups are the last resort in the event of a ransomware attack, before paying the ransom (ranging from a few thousand to several million euros). It is also important to check that these backups remain usable over time and can be used if necessary.

By following these tips and remaining vigilant, you can significantly reduce the risk of falling victim to ransomware. However, no system is infallible, and it is essential to have a complete and up-to-date backup of your data in case of need.

Our teams are available to answer any questions you may have.

Articles suggérés