Your browser version is outdated. We recommend that you update your browser to the latest version.

AusScot Computer Services

Contact Robin for all your computer needs on Mobile 0416255122

Including

* Repairs, upgrades & system servicing

* New systems, printers, modems

* Broadband advice, networking

* Security, advice on viruses, spyware

* Data recovery

* Faults

* Onsite service - pickup & deliver

* Remote online service

All new hardware products warranted All work guaranteed

Registered member (ACS) Australian Computer Society

Share on Social Media

A copy of our CEO Craig McDonald’s first book, Surviving the Rise of Cybercrime, to be launched at Parliament House .

Surviving the Rise of Cybercrime is a non-technical guide aimed at helping leaders and executives understand and navigate cybercrime.

Packed with real-world examples, the book explains in under an hour who perpetrates it, who pays the price and how best to safeguard your company and customers against it.

The Hon. Dan Tehan, Minister Assisting the Prime Minister for Cyber Security, is officially launching the book, which is already receiving strong praise from industry and government experts.

Copy available here:

http://ausscot.com.au/data/documents/4991-Mailguard-Surviving-the-rise-of-cybercrime-digital-FA.pdf

AusScot Computers Security

 https://www.scamwatch.gov.au/

Reliable backups are your last line of defense against cryptolocker ransomware

 Hackers can’t hold your business data to ransom if you’ve got backup copies tucked away safe and sound.

Rather than stealing your business data, some hackers find it easier and more lucrative to sneak malware onto your computer to encrypt your business data. They then demand money in return for the password so you can unlock your precious data files.

If you can’t afford for this to happen, then you can afford to spend the time, effort and money to put safeguards in place.

Ransomware tends to arrive via email, as an infected file attached to an innocent-looking email.

They’re often disguised as notifications of unpaid invoices, unclaimed tax refunds or undelivered parcels – the kinds of mundane emails which businesses receive every day. The hackers are hoping you will open the attachment without giving it a second thought until it’s too late.

How to protect your business &/or personal data.

There are several countermeasures you can deploy to reduce the chances of ransomware finding its way onto your business/personal computers.

One is to employ gateway and/or desktop/email anti-spam security to stop these emails reaching you, or at least mark them as suspicious, although the fact the emails look so innocent makes them hard to spot. Another is to run gateway and/or desktop anti-virus security programs to catch those infected attachments, although hackers tend to stay one step ahead so ransomware can still sneak through.

The next line of defense doesn’t rely on technology, instead it relies on training , to treat these emails with suspicion.

At the end of the day these attacks rely on tricking a person into opening the attachment, so a little bit of cyber-security awareness training can go a long way towards stopping ransomware getting a foothold in your business.

Of course, people make mistakes, they’re only human. That’s why your last line of defense against cryptolocker ransomware is a reliable backup system, so you can wipe your computer, reinstall everything and get back to work.

Even small businesses or individuals can benefit from investing in a business-grade backup system – especially when you consider what that lost data might cost the business or you personally  in terms of lost productivity and perhaps even lost customers. A reliable backup strategy won’t just protect you against ransomware, it could also save the day in the event of hardware failure, fire, flood, theft or other disasters.

You need to plan your backup strategy with care because, unlike other tech disasters, ransomware goes out of its way to foil your recovery efforts. Once ransomware has encrypted your files it often deletes Shadow Volume copies and Windows System Restore points to make it harder to roll back to before the infection.

 

Next the ransomware looks for other devices to attack, such as attached USB drives, Network Attached Storage drives and even mapped cloud drives that are accessible from that computer.

Your backups can’t save you from a ransomware attack if they’re also encrypted. Basic cloud backup/sync services might not protect you either, not if they’re simply going to upload the encrypted files and overwrite your backups.

 

At the very least you need a backup system that keeps previous versions of your files, so if an encrypted file is backed up you can go back in time to access a previous backup.

Some backup systems let you do this manually, but if you’re dealing with lots of files you might benefit from a batch restore option.

Unlike cloud storage/sync software, dedicated backup software – whether it’s backing up to the cloud or a network drive – tends to contain granular backup and version controls as well as flexible batch restore options that let you roll back to a specific point in time.

The previous versions of your files should not be stored on easily-accessed mapped network drives where the cryptolocker virus can get to them.

There are plenty of ways to go about this; there’s no one-size-fits-all solution for every business/personal computer. The basic rule of thumb is that if you can easily open your backup files from your computer then so can the cryptolocker virus.

If this sounds like your business/personal computer, it’s time to step up to a business-grade backup system.

 

Our recommendation of reliable software:

  Acronis True Image Backup.

http://www.acronis.com/en-au/promotion/personal/SEM/?gclid=CI_9sdeAttECFQgKKgodzcMOxg

 Zone Alarm Extreme Security. (by Check Point Software).

http://www.zonealarm.com/software/release-history/zaxs.html

Malware Bytes  Anti-Malware

https://www.malwarebytes.com/

 

Security Assistance