{"id":81,"date":"2019-11-08T16:01:21","date_gmt":"2019-11-08T10:31:21","guid":{"rendered":"http:\/\/bluemap.co\/blog\/?p=81"},"modified":"2022-01-07T11:46:35","modified_gmt":"2022-01-07T11:46:35","slug":"ransomware-and-how-to-protect-yourself-2","status":"publish","type":"post","link":"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/","title":{"rendered":"Ransomware and how to protect yourself."},"content":{"rendered":"\n<p>Ransomware attacks are on the rise nowadays. A report suggested that Ransomware alone cost companies up to $20Billion in yearly damages. Cybercriminals that use it are looking to do just one thing- extort your hard-earned money. This usually pops with a notification on your screen which <strong>says \u201cALL YOUR FILES HAVE BEEN ENCRYPTED, write an email to <a href=\"mailto:xyx@xyz.com\">xyx@xyz.com<\/a> to obtain a decryption key after paying random amount in BitCoins or else your data would be deleted.\u201d<\/strong><\/p>\n\n\n\n<p>How does it work? <\/p>\n\n\n\n<p>The notification shown above is the end result, but how all\nof it start? For a Ransomware to start working it follows a lifecycle:<\/p>\n\n\n\n<ul><li>Click on a malicious link or download a malicious file.<\/li><li>Ransomware gets activated.<\/li><li>Files get encrypted.<\/li><li>Ransom is demanded in form of virtual currency.<\/li><li>Data is decrypted [very very rare].<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"640\" height=\"479\" src=\"https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2.jpg\" alt=\"\" class=\"wp-image-79\" srcset=\"https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2.jpg 640w, https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2-300x225.jpg 300w, https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2-520x389.jpg 520w, https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2-360x269.jpg 360w, https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2-250x187.jpg 250w, https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2-100x75.jpg 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p><strong><a href=\"https:\/\/www.bluemap.co\/bluemap-services\/\">Do\u2019s and dont\u2019s to prevent yourselves against Ransomware attacks<\/a>:<\/strong><\/p>\n\n\n\n<p><strong>DO <\/strong>backup all\nyour files regularly- manually or automate the process.<\/p>\n\n\n\n<p><strong>DO<\/strong> isolate your\ndevice from the network if it is infected with a Ransomware and remove all external\ndevices connected to it.<\/p>\n\n\n\n<p><strong>DO<\/strong> inform your IT\ndepartment about the attack.<\/p>\n\n\n\n<p><strong>DO<\/strong> have a well-designed\nZero Trust Security Policy for your critical resources and the entire network.<\/p>\n\n\n\n<p><strong>DO<\/strong> make sure everything\nis updated with patches so vulnerable software cannot be tampered with.<\/p>\n\n\n\n<p><strong>DO<\/strong> enable content\nscanning on your mail server.<\/p>\n\n\n\n<p><strong>DO<\/strong> educate and\nkeep yourself updated with latest threats in the market.<\/p>\n\n\n\n<p><strong>DON\u2019T<\/strong> hand out\npersonal information over email or phone call [phishing]<\/p>\n\n\n\n<p><strong>DON\u2019T<\/strong> click on\nlinks in email. Always visit the website from your browser by typing the URL.<\/p>\n\n\n\n<p><strong>DON\u2019T<\/strong> pay ransom\nto the hacker. This will discourage them to attack as per the FBI.<\/p>\n\n\n\n<p><strong>DON\u2019T<\/strong> download\npirated software. Always do it from the manufacturer\u2019s website. Money paid will\nbe far less than damage caused due to cyber-attack.<\/p>\n\n\n\n<p>Unfortunately, Ransomware attacks are going to be there for a long time. This is an easy way to rob individuals and companies alike of their money and not to mention their privacy. The only hope to prevent yourself against it is education and few do\u2019s and dont\u2019s listed above.<\/p>\n\n\n\n<p>True <a href=\"https:\/\/www.bluemap.co\/bluemap-services\/\">Ransomware protection<\/a> comes from layered security approach rather than a single point of protection. In simple words, it can be said that the castle should not only be guarded with locks on the main door but to provide protection at each point which may grant access to the castle. Even one point of compromise can cost you the entire castle. &nbsp;Don\u2019t get scared, Stay safe!!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware attacks are on the rise nowadays. A report suggested that Ransomware alone cost companies up to $20Billion in yearly damages. Cybercriminals that use it are looking to do just one thing- extort your hard-earned money. This usually pops with [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":79,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Yourself from Ransomeware | BlueMap Blogs<\/title>\n<meta name=\"description\" content=\"Other than keep taking a backup of your data periodically, how to avoid ransomware attacks? Protection against such dangerous malware is a necessity. Keep reading...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Yourself from Ransomeware | BlueMap Blogs\" \/>\n<meta property=\"og:description\" content=\"Other than keep taking a backup of your data periodically, how to avoid ransomware attacks? Protection against such dangerous malware is a necessity. Keep reading...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Bluemap Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-08T10:31:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-07T11:46:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"479\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Omar Memon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bluemap.co\/blog\/#website\",\"url\":\"https:\/\/bluemap.co\/blog\/\",\"name\":\"Bluemap Blog\",\"description\":\"Bluemap Networking\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bluemap.co\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2.jpg\",\"contentUrl\":\"https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2.jpg\",\"width\":640,\"height\":479},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/#webpage\",\"url\":\"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/\",\"name\":\"How to Protect Yourself from Ransomeware | BlueMap Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/bluemap.co\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/#primaryimage\"},\"datePublished\":\"2019-11-08T10:31:21+00:00\",\"dateModified\":\"2022-01-07T11:46:35+00:00\",\"author\":{\"@id\":\"https:\/\/bluemap.co\/blog\/#\/schema\/person\/9d599f7baf3378325f84bcb82f73806a\"},\"description\":\"Other than keep taking a backup of your data periodically, how to avoid ransomware attacks? Protection against such dangerous malware is a necessity. Keep reading...\",\"breadcrumb\":{\"@id\":\"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/bluemap.co\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware and how to protect yourself.\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/bluemap.co\/blog\/#\/schema\/person\/9d599f7baf3378325f84bcb82f73806a\",\"name\":\"Omar Memon\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/bluemap.co\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3c4adedcbb1ca216fa9c709387b3ce9a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3c4adedcbb1ca216fa9c709387b3ce9a?s=96&d=mm&r=g\",\"caption\":\"Omar Memon\"},\"description\":\"Network Consultant and Trainer by profession with knowledge in multi-vendor environment ranging from routing and switching in Cisco and Juniper to firewalls from Cisco, Palo Alto, Juniper, CheckPoint and Fortigate to virtualization in Cisco UCS and design and deployment of Cisco Viptela SD-WAN solution. Successfully designed and deployed green field and grey field networks for various small to mid-scale organizations.\",\"url\":\"https:\/\/bluemap.co\/blog\/author\/omar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Yourself from Ransomeware | BlueMap Blogs","description":"Other than keep taking a backup of your data periodically, how to avoid ransomware attacks? Protection against such dangerous malware is a necessity. Keep reading...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/","og_locale":"en_US","og_type":"article","og_title":"How to Protect Yourself from Ransomeware | BlueMap Blogs","og_description":"Other than keep taking a backup of your data periodically, how to avoid ransomware attacks? Protection against such dangerous malware is a necessity. Keep reading...","og_url":"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/","og_site_name":"Bluemap Blog","article_published_time":"2019-11-08T10:31:21+00:00","article_modified_time":"2022-01-07T11:46:35+00:00","og_image":[{"width":640,"height":479,"url":"https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Omar Memon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/bluemap.co\/blog\/#website","url":"https:\/\/bluemap.co\/blog\/","name":"Bluemap Blog","description":"Bluemap Networking","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bluemap.co\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/#primaryimage","inLanguage":"en-US","url":"https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2.jpg","contentUrl":"https:\/\/bluemap.co\/blog\/wp-content\/uploads\/2019\/11\/images-2.jpg","width":640,"height":479},{"@type":"WebPage","@id":"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/#webpage","url":"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/","name":"How to Protect Yourself from Ransomeware | BlueMap Blogs","isPartOf":{"@id":"https:\/\/bluemap.co\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/#primaryimage"},"datePublished":"2019-11-08T10:31:21+00:00","dateModified":"2022-01-07T11:46:35+00:00","author":{"@id":"https:\/\/bluemap.co\/blog\/#\/schema\/person\/9d599f7baf3378325f84bcb82f73806a"},"description":"Other than keep taking a backup of your data periodically, how to avoid ransomware attacks? Protection against such dangerous malware is a necessity. Keep reading...","breadcrumb":{"@id":"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/bluemap.co\/blog\/2019\/11\/ransomware-and-how-to-protect-yourself-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bluemap.co\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware and how to protect yourself."}]},{"@type":"Person","@id":"https:\/\/bluemap.co\/blog\/#\/schema\/person\/9d599f7baf3378325f84bcb82f73806a","name":"Omar Memon","image":{"@type":"ImageObject","@id":"https:\/\/bluemap.co\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/3c4adedcbb1ca216fa9c709387b3ce9a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3c4adedcbb1ca216fa9c709387b3ce9a?s=96&d=mm&r=g","caption":"Omar Memon"},"description":"Network Consultant and Trainer by profession with knowledge in multi-vendor environment ranging from routing and switching in Cisco and Juniper to firewalls from Cisco, Palo Alto, Juniper, CheckPoint and Fortigate to virtualization in Cisco UCS and design and deployment of Cisco Viptela SD-WAN solution. Successfully designed and deployed green field and grey field networks for various small to mid-scale organizations.","url":"https:\/\/bluemap.co\/blog\/author\/omar\/"}]}},"_links":{"self":[{"href":"https:\/\/bluemap.co\/blog\/wp-json\/wp\/v2\/posts\/81"}],"collection":[{"href":"https:\/\/bluemap.co\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bluemap.co\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bluemap.co\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/bluemap.co\/blog\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":3,"href":"https:\/\/bluemap.co\/blog\/wp-json\/wp\/v2\/posts\/81\/revisions"}],"predecessor-version":[{"id":343,"href":"https:\/\/bluemap.co\/blog\/wp-json\/wp\/v2\/posts\/81\/revisions\/343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bluemap.co\/blog\/wp-json\/wp\/v2\/media\/79"}],"wp:attachment":[{"href":"https:\/\/bluemap.co\/blog\/wp-json\/wp\/v2\/media?parent=81"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bluemap.co\/blog\/wp-json\/wp\/v2\/categories?post=81"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bluemap.co\/blog\/wp-json\/wp\/v2\/tags?post=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}