Wednesday, April 19, 2017

Ransomware-as-a-Service Starter Pack Has Been Discovered

http://ifttt.com/images/no_image_card.png

While ransomware attacks aren’t for the faint of heart, ransomware-as-a-service helps even the least experienced cybercriminal reach a new low. Cybercrimes and ransomware have pushed their way through the marketplace, paving their way to make some quick cash (well, Bitcoin, technically…). Ransomware is a type of malicious software that locks files and only decrypts them in exchange for a ransom. Most strains of ransomware are deployed by professional criminals. Ransomware-as-a-service (RaaS), however, can be purchased and deployed by an amateur.

from reevert Blog https://www.reevert.com/blog/ransomware-as-a-service-starter-pack-has-been-discovered

Friday, March 31, 2017

10 Easy Cybersecurity Tips for SMBs

http://ifttt.com/images/no_image_card.png

Cyber and data security concerns are kept at top of mind for SMBs, as they very well should be. The surge in security breaches over the last several years prove that cybersecurity is no longer something to just snub our noses at; we need to consciously make an effort to protect ourselves. This article walks you through 10 easy cybersecurity tips for SMBs to implement and shield your data from the dangers of digital attacks.

from reevert Blog https://www.reevert.com/blog/10-easy-cybersecurity-tips-for-smbs

Thursday, March 2, 2017

reevert - the #1 Virtual Storage Appliance


Virtual storage appliances are becoming increasingly popular in the IT world. Basically, a virtual storage appliance allows a Virtual Machine (VM) to create a shared storage solution – without investing in additional hardware. This allows for cost savings and increased availability, as a Virtual Storage Appliance (VSA) can make use of all unused virtual machine data storage, maximizing the capacity of your hardware while providing a useful, redundant backup solution.
Enter reevert. Our comprehensive, all-in-one Active Directory integrated virtual storage appliance allows your IT team to manage the data from a convenient web based panel, and the feature-rich, efficient software behind reevert allows unparalleled protection against data loss, natural disasters, and even dangerous viruses like Cryptolocker ransomware.
And that’s not all. reevert is robust, reliable, and easy-to-use, and has a myriad of exceptional product features that make it the perfect choice for your virtual storage appliance needs.
So if you’re looking for a convenient all-in-one virtual storage appliance, read on, and learn more about what makes reevert such a great choice for your IT needs.

Wednesday, March 1, 2017

reevert 1.9.0 has been released

http://ifttt.com/images/no_image_card.png

We have been working on exciting new features and improvmenets which are now available as reevert firmware 1.9.0 and reevert appliance OVA 1.9.0. Click to read about new features and major improvements.

from reevert Blog https://www.reevert.com/blog/reevert-190-has-been-released

Wednesday, February 1, 2017

Education Is The Key To Keeping Higher Learning Networks Safe From Ransomware

http://ifttt.com/images/no_image_card.png

Although they aren’t typically thought of as a business, higher education institutions hold just as much critical data as any corporation. Without access to this data, it is practically impossible for colleges and universities to operate. That is precisely why they have become a target for those looking to hijack computer systems and hold critical data for ransom. Campus IT has become a haven for hackers looking to hold information systems hostage in return for an enormous monetary payoff.

from reevert Blog https://www.reevert.com/blog/education-is-the-key-to-keeping-higher-learning-networks-safe-from-ransomware

Friday, January 27, 2017

US College Forced To Pay $28,000 To Get Files Back After Ransomware Attack

The Los Angeles Valley College is only one of hundreds of institutions to learn the hard way that data security is the best way to maintain your digital assets. This past December, the college was forced to pay $28,000 via Bitcoins to hackers who held their information for ransom.
Read more here: https://www.reevert.com/blog/us-college-forced-to-pay-28000-to-get-files-back-after-ransomware-attack

Source:  https://www.reevert.com/reevert

Monday, October 31, 2016

What is Ransomware? (And How Does It Affect You?)


Ransomware is one of the most common types of malware attacks today, and once you’ve been targeted, it’s difficult to get yourself out of the situation. The attackers encrypt your files, and they’re the only ones that have the key. Decryption is next to impossible. Unfortunately, many Ransomware victims end up simply paying the hackers -- which is exactly what they want you to do.
Ransomware isn’t a particularly new idea. The first such program, “AIDS,” was created in 1989. However, this approach to extortion has gained newfound popularity in recent years. In 2013, McAfee reported that they had collected over 250,000 samples of ransomware, twice the number in the first quarter of 2012.
For users, the first line of defense is awareness. It’s important to know what ransomware is, how it works, and how you can protect yourself against it.

How Ransomware Works

There are actually two types of ransomware: encrypting and non-encrypting. Both types often use “scareware” tactics, using social engineering to frighten you into doing what the hackers say. They often claim that you’re doing something illegal, or that your computer is infected.
Encrypting ransomware uses cryptography, making your files impossible to access. To get them back, you need a private decryption key from the hacker. The nature of the encryption method they use makes it basically impossible to simply guess the key, or to find it within the program itself. They’ll ask for a ransom in exchange for the key, usually several hundred or even hundreds and thousands of dollars. One of the most high-profile recent ransomware programs, CryptoLocker, asked specifically for payment via Bitcoin -- which is anonymous and difficult to track. It successfully extorted an estimated total of $27 million from users worldwide. But keep in mind that ransomware doesn’t just infect your single computer - it infects your entire network and the shares accessible to that computer.
Another type of ransomware doesn’t encrypt your files; holding you hostage, by other means. Some are “lockscreen ransomware.” These programs freeze you out of your PC until you pay up. When you boot up your computer, you’ll be confronted by an intimidating full-screen window. It’s often designed to look like something official from the FBI or the US Department of Justice. Alternately, there are some strains of ransomware that delete Windows Shadow Copies and backup files by known programs, which is what makes them extremely harmful.

Keeping Yourself Protected

Once your PC has been infected by ransomware, it’s difficult to fix the problem. However, these digital security best practices can help you avoid acquiring the malicious software in the first place.

Keep your Antivirus Program Up to Date

For most users, especially the less tech-savvy among us, it’s always a good idea to have a good, up to date antivirus program. Choosing the right antivirus can be tricky, as many of these programs are bloated, ad-heavy, and questionably effective. Avira, Kaspersky, and Avast are good places to start. There’s also Malwarebytes, which focuses specifically on certain types of malware and adware. You’ll need to keep your antivirus software up to date, as new threats come around all the time.
Enable File Extensions
In Windows, file extensions are usually disabled by default. However, enabling this option can help you spot deceptive files. Things with extensions like .exe (program files) or .js (Javascript files) could very well be malware, especially if their names are designed to look like an image or a text file.
Backup Your Data Regularly
If you’re not completely reliant on cloud storage, and important files are stored locally, it’s important to make a backup. If your files are encrypted by ransomware, you can just access them from the most recent backup.
Employees Shouldn’t Have Admin Privileges
There’s really no good reason for non-IT staff to have administrator accounts in Windows. Admin accounts have more power to run programs and install things, which opens up possibilities for malware.
Keep Your Software Up to Date
Be sure to keep up with all important patches and updates for important software applications. Without them, security holes could be exploited by malware attacks.
Online, Always Check the URL
Many malware attacks start when you inadvertently download something from a website disguised to look official. Always look at the URL and make sure it’s correct. Also, it’s advisable that you use an adblocker for your browser, such as Ublock Origin. Ads can potentially harbor malicious programs.
Use Ransomware Resistant Storage Options
Storage options like Reevert can add an extra layer of protection against ransomware attacks. They’re specifically designed to safeguard important data against this particular form of malware, making them a great choice for small and medium businesses who need protection. Reevert allows you to backup your data instantly, and create regular backups on a consistent schedule. If you’re targeted by malware, you can simply access the backed up copies of your files.
Keep Yourself and Your Staff Aware and Protected
Because ransomware has become such a popular form of malware in recent years, it’s important for your non-IT staff to be aware that it’s a potential threat. It’s also important for your IT department to backup the data, install reliable antivirus and anti-malware programs, and avoid giving users too much control over software installation. Once you’ve been hit by a ransomware attack, your options are limited. The best protection is to avoid ransomware altogether by following good security practices.