window.lintrk('track', { conversion_id: 7652236 });


A couple of weeks back, we’ve shared what happens to your data in a ransomware attack. It can be costly and inconvenient for regular folks losing personal data, but even more costly and critical if it’s business data that is being held for ransom.

Ransomware, as you can imagine, is a pretty profitable business for cyber criminals. New attacks are being devised consistently. And while ransomware is far from getting away anytime soon and only growing in frequency and pervasiveness, hope is not all lost. There are precautions one can take against this attack.

Click here to know about managed services, one of the absolute ways for data protection beyond the hardware that houses it. 

Masood Nasir, a Telus Information Security Consultant, strongly recommends the following precautions:

1. Back up regularly offline. If your backup drive is connected to your computer, most ransomware will encrypt files on it as well

2. Think before you click. Do not click on links or attachments from unknown sources. Verify that the email address is valid

3. Invest in the right technology. Use an anti-virus solution and keep it up to date

4. Update religiously. Take the time to download regular operating system updates to stay current

For advanced computer users, he recommends:

5. Disable “Hide extensions for known file types” so you can see the actual extension of the file

6. Enable “Show hidden files, folders, and drives” so you can see all files and folders

7. Share for information. When you receive a spam email with a malicious attachment, be sure to (1) share the sample by uploading it on so that anti-virus vendors and security researches can analyze it further, and (2) copy the email content with headers to anti-spam tools like so that the source of the spam campaign can be shut down sooner than later

With awareness and proper training, you can keep your systems safe from evolving threats like ransomware and make sure that no one in your organization clicks and puts your data in a hostage situation.



If you want to strengthen your stance with cyber and IT security, click below to schedule a FREE network assessment with us. This will help us determine the vulnerability of your infractructure and propose the necessary measures.

Source: Telus