Blog Layout

 Protect your business from ransomware attacks

Over the past 18 months, cybercriminals have increased the number of ransomware attacks targeting Australians.

 

Ransomware is one of the most damaging types of cyber attacks, which can have severe and long-lasting impacts to Australian organisations and their operations.

 

Ransomware is a type of malicious software that makes your computer or its files unusable unless you pay a fee, often in the form of untraceable cryptocurrencies such as Bitcoin. It requires minimal technical expertise, is low cost and can result in significant financial harm. Recovering from ransomware is almost impossible without comprehensive backups, which is why taking steps to protect yourself is so important.Why is it important to turn it on?


Protective measures are simple, cost-effective and immediately beneficial

Protective measures can prevent ransomware from occurring in the first place. There are many easy actions you can take now.


Prepare for a ransomware attack

You can be the victim of a ransomware attack at any time.

There are steps you can take to protect yourself against it.


Update your device and turn on automatic updates

Cybercriminals use known weaknesses to hack your devices. System updates have security upgrades to patch these weaknesses.

You should always update your system and applications when prompted.

You can turn on automatic updates so that this happens without your input.


Turn on multi-factor authentication

Having two or multi-factor authentication increases your cyber security. Multi-factor authentication means there are two checks in place to prove your identity before you can access your account. For example, you may need to supply an authentication code from an app and your password.

It makes it more difficult for someone to access your files or account.

Turn on multi-factor authentication with our helpful guides for:


Remember to use strong passwords and passphrases for your accounts.


Set up and perform regular backups

A backup is a digital copy of your most important information (e.g. photos, financial information or health records) that is saved to an external storage device or to the cloud.

The best recovery method for a ransomware attack is a regular offline backup made to an external storage device and a backup in the cloud. Backing up and checking that backups restore your files offers peace of mind.

You can set up automatic backups in your system or application settings.


Implement access controls

Controlling who can access what on your devices is an important step to minimise the risk of unauthorised access. It will also limit the amount of data that ransomware attacks can encrypt, steal, and delete.

To do this, give users access and control only to what they need by restricting administrator privileges. Don’t share your login details for your accounts.


Turn on ransomware protection

Some operating systems offer ransomware protection. Make sure you enable this function to protect your devices.

ACSC has developed a guide to help you. Follow our step-by-step guide to turn on ransomware protection on your device.


Prepare your cyber emergency plan

If you are responding to a ransomware attack, read What to do if you’re held to ransom now.

Download and save or print out the Ransomware Action Checklist and the Cyber Security Emergency Plan.

It is important that these plans are easily accessible and known to all employees, especially in the event of a ransomware incident.


Get to know your critical data

Know what data is most important to you. With your business, personal information, or devices, you need to consider what you:

  • can and cannot replace,
  • will invest to recover the information or device,
  • are willing to live without, and
  • must keep safe.

Loss of any data could limit the ability for your business to conduct day-to-day activities, impact to your reputation and credibility, or risk losing customers. While you might think photos and other business documents are most important, it is worth considering other data that is critical to your business operations, for example:

  • Financial/transaction data
  • Customer data (e.g. PII, contact information)
  • Communication platforms (e.g. access to, and history of emails)
  • Calendars (e.g. appointments and bookings)
  • Inventory and supplier data.


Remain vigilant and informed

Sign up to get alerts through the free ACSC’s alert service. This service will send you an alert when a new cyber threat is identified. 


A confused man ready to demistify his Profit and Loss statement
By Bernadette Zamora May 18, 2023
The first in a series on understanding your financial statements, Bernadette Zamora takes you through the basics of getting to know your Profit and Loss statement.
7 tips to make your WordPress website faster
By BEC Admin May 10, 2023
There are some simple steps you can take to serve your website faster to your customers, and consequently rank higher on search engines. Check out our blog to find out how.
Tax officer takes money from business owner.
By Bernadette Zamora May 4, 2023
Running a business can be a blast, but let's be real, taxes are not the most exciting part of the job. But who says tax talk has to be dull and dreary? In this blog post, we're going to spice things up a bit and make taxes a little more fun. So, grab your calculator, let's dive in and have some tax-tastic fun!
Share by: