Over the past 18 months, cybercriminals have increased the number of ransomware attacks targeting Australians.
Ransomware is one of the most damaging types of cyber attacks, which can have severe and long-lasting impacts to Australian organisations and their operations.
Ransomware is a type of malicious software that makes your computer or its files unusable unless you pay a fee, often in the form of untraceable cryptocurrencies such as Bitcoin. It requires minimal technical expertise, is low cost and can result in significant financial harm. Recovering from ransomware is almost impossible without comprehensive backups, which is why taking steps to protect yourself is so important.Why is it important to turn it on?
Protective measures can prevent ransomware from occurring in the first place. There are many easy actions you can take now.
You can be the victim of a ransomware attack at any time.
There are steps you can take to protect yourself against it.
Cybercriminals use known weaknesses to hack your devices. System updates have security upgrades to patch these weaknesses.
You should always update your system and applications when prompted.
You can turn on automatic updates so that this happens without your input.
Having two or multi-factor authentication increases your cyber security. Multi-factor authentication means there are two checks in place to prove your identity before you can access your account. For example, you may need to supply an authentication code from an app and your password.
It makes it more difficult for someone to access your files or account.
Turn on multi-factor authentication with our helpful guides for:
Remember to use strong passwords and passphrases for your accounts.
A backup is a digital copy of your most important information (e.g. photos, financial information or health records) that is saved to an external storage device or to the cloud.
The best recovery method for a ransomware attack is a regular offline backup made to an external storage device and a backup in the cloud. Backing up and checking that backups restore your files offers peace of mind.
You can set up automatic backups in your system or application settings.
Controlling who can access what on your devices is an important step to minimise the risk of unauthorised access. It will also limit the amount of data that ransomware attacks can encrypt, steal, and delete.
To do this, give users access and control only to what they need by restricting administrator privileges. Don’t share your login details for your accounts.
Some operating systems offer ransomware protection. Make sure you enable this function to protect your devices.
ACSC has developed a guide to help you. Follow our step-by-step guide to turn on ransomware protection on your device.
If you are responding to a ransomware attack, read What to do if you’re held to ransom now.
Download and save or print out the Ransomware Action Checklist and the Cyber Security Emergency Plan.
It is important that these plans are easily accessible and known to all employees, especially in the event of a ransomware incident.
Know what data is most important to you. With your business, personal information, or devices, you need to consider what you:
Loss of any data could limit the ability for your business to conduct day-to-day activities, impact to your reputation and credibility, or risk losing customers. While you might think photos and other business documents are most important, it is worth considering other data that is critical to your business operations, for example:
Sign up to get alerts through the free ACSC’s alert service. This service will send you an alert when a new cyber threat is identified.