Posts

Showing posts from June, 2022

Ransomware: The Growing Online Endemic. What is It?

Image
  First things first. What is ransomware? Ransomware, aptly described in a roundtable discussion in London as “the endemic of our time”, is malicious software that infects your computer and first either: Encrypts your files to prevent you from accessing them Locks your computer/device screen Then, it displays messages demanding a fee to be paid in order to restore access to your data, or avoid having your sensitive files leaked to the public, or have your system work again. 1. How Does Ransomware Get into Your Computer or Device? Ransomware can be installed on your computer or device through deceptive links in an email message, attachments, or links in instant messages (chat), from an infected hardware device such as a flash drive, or via websites. Ransomware has the ability to lock a computer screen or encrypt important, predetermined files with a password. There are several ways ransomware can get into a system. One of the most common ways is through phishing emails. Some phishi...

The Golden 3-2-1 Backup Rule – A Resilient Backup Strategy

Image
  1. Introduction Backup ensures that your critical business data will survive any eventuality that could lead to its loss. Many companies have suffered from having their hardware – servers/PCs/laptops/tablets/phones ) – lost or stolen, destroyed by fires or floods, infected with malware or corrupted by targeted hacker attacks (viruses, worms, ransomware). 2. So What is the 3-2-1 Backup Rule? You may already know that backup is important. However, it is just as important to remember that having one backup copy is often not enough. Let’s assume that you backup your server to an external drive or tape, which you keep in your office. If your server crashes, you have the backup copy. However, if a fire breaks out in your office, it will destroy both your server and the external drive/tape. For a one-server user, a backup strategy may be as simple as copying all important files to another device(s) – and keeping them in a safe place, away from the primary source. However, for multiple s...

The Golden 3-2-1 Backup Rule – A Resilient Backup Strategy

Image
  1. Introduction Backup ensures that your critical business data will survive any eventuality that could lead to its loss. Many companies have suffered from having their hardware – servers/PCs/laptops/tablets/phones ) – lost or stolen, destroyed by fires or floods, infected with malware or corrupted by targeted hacker attacks (viruses, worms, ransomware). 2. So What is the 3-2-1 Backup Rule? You may already know that backup is important. However, it is just as important to remember that having one backup copy is often not enough. Let’s assume that you backup your server to an external drive or tape, which you keep in your office. If your server crashes, you have the backup copy. However, if a fire breaks out in your office, it will destroy both your server and the external drive/tape. For a one-server user, a backup strategy may be as simple as copying all important files to another device(s) – and keeping them in a safe place, away from the primary source. However, for multiple s...

How to Recover from a Compromised or Hacked Email Account

Image
  1. What is a compromised (or hacked) email account? Access to email accounts is mostly through the use of a username and password and/or PIN. A username and password are intended to be kept secret. However, should a hacker (unauthorized person) gain access to these credentials and use them to access your email account, your email is said to be compromised or hacked. Upon gaining access to the email account, the hacker can then masquerade as the original user. He/she may also have access to folders or files in your online storage. In this article, we will cover how to know whether your email account has been compromised, how it happened, what to do should your email be compromised, and how to prevent it from happening again. 2. How do I know whether my email has been compromised? There are signs that would indicate that your email has been compromised, some more obvious than others. The most common are:- You are unable to log into your account. In this case, a hacker may have chan...