go to sections menu

3 Simple Steps To Disrupt Ransomware from blog The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: article commentary > 3 Simple Steps To Disrupt Ransomware

Go to Homepage, contents or to navigation menu

3 Simple Steps To Disrupt Ransomware

This article entitled 3 Simple Steps To Disrupt Ransomware could not come at a better time.

  • Backup, backup, backup
  • Patch ASAP
  • Key security controls

    :#1 Backup, Backup, Backup p
    Ransomware is often compared to physical crime. It’s easier to understand the underlying concept that way. But there is a fundamental difference that you have to remember: digital data can be copied easily for little to no expense.
    That can change the dynamics of the crime. In the physical real world, if criminals steal an object to hold for ransom, you no longer have the that object. If you pay up the might return it or they might simply take the money and run.”

    This is good in the fact that we can preach this all day long, but we just need to do it today. There’s more for this, but I think this quote can be left for you guys to digest.

    “#2 Patch ASAP
    Software is inherently complex. Mistakes will be made and updates will be available. These updates usually contain important security updates that patch the very vulnerabilities that criminals take advantage of.”

    This is becoming easier, but still a chore. Turning on auto update can be a blessing or a curse, depending on how you view it. From an accessibility standpoint, we can say that fixed software is not always better. I can agree with that in some cases where developers have definitely broke things and they had to go back and fix it. For the most part, upgrading should not break the chore functionality of what is known as the main program. What I hate are those developers who change the menu interface of what we’ve learned, thinking it is better. We have to learn it all over again. That can be a curse for someone who is disabled. There’s more to this one as well.

    “#3 Key Security Controls
    Even with a strong backup strategy and patching immediately, there is still a strong possibility that your systems remain partially exposed. This is where 3rd party security controls come into play.”

    There is more to this but this may be the hardest part of our job as disabled people. We may not be able to use these third party applications which are designed to help us because they don’t work with any type of access technology. I’d love to use a leading AntiVirus program, however, the leaders are not accessible. AntiVirus is only part of what we should use, and again, the newer programs aren’t always the ones we should use.

    Part of our problem is that we are small compared to the mass market. We somehow need to get our voices heard to where accessibility can be included so we can be part of the solution.

  • Stop incoming attacks using an intrusion prevention system
  • Try to stop infections from taking root by using anti-malware software
  • Block outbound connections to attackers infrastructure using outbound filtering

Is any of this stuff accessible to those with disabilities? I doubt it.

Also, as stated before, everyone is telling us not to pay the money as that is the motivation to their antics. In certain cases, it may be the only option, and that, i understand. Here is what Mark has to say.

“I agree with that position but also understand the difficult nature of the position you might be in after an attack of this nature.
That’s why it’s critical that you make a small investment now to ensure that you have backups in place, patch regularly, and have basic security controls to help stop any attack being they lock up your data.”

Mark recommends if anyone is interested in reading more, read the no more ransomware project. I’ve not looked at it yet, but I plan to take a look.

Informazioni sull'articolo

3 Simple Steps To Disrupt Ransomware was released on January 16, 2017 at 9:00 pm by tech in article commentary.
Last modified: January 16, 2017.

Comments (0)

No comments yet.

Leave a comment

You must be logged in to post a comment.

go to sections menu

navigation menu

go to sections menu