The current wave of crypto-viruses is causing quite a stir. End users such as companies are afraid that the data on their computers could be encrypted. A recent example shows that these concerns are not unfounded and even entire administration departments can be paralyzed. But what security measures can companies and individuals use to protect themselves against malware?   Daniel Hofmann has four tips that can greatly increase the protection of your own hardware:  
  • Software updates: Every user and every company should be sure to keep their software up to date in order to minimize existing security vulnerabilities.
  • Protect access points: The two main gateways for malware are the internet and emails. Appropriate services such as spam and virus filters or Hornetsecurity’s Webfilter Service can close down these paths.
  • The users themselves: Each and every user shares responsibility for malware being able to penetrate via email. No one should completely rely on possible upstream services: each email should be critically checked to determine whether the sender is known or whether an order was actually placed, with the aim of detecting a fake invoice in the email attachment.
  • Backups: Users and companies should regularly backup their data, either to external storage devices or cloud storage services such as Hornetdrive.
  The last point needs to be discussed in more detail at this point because encrypted files can be automatically synchronized and uploaded even with cloud storage services. If this actually occurs, a versioning function of stored files helps with storage services such as Hornetdrive. After all, the user can continue to access unencrypted versions of the files. As they are securely stored in the Hornetdrive cloud, the CryptoLocker cannot access these old versions of the files. Old versions are only deleted if the number of versions in a drive is limited and there are too many versions of respective file. With Hornetdrive, the desired number of versions for a drive can be individually set in the Client.