How to Protect Yourself from Ransomware

We often hear reports that malware makes data unusable. If you pay a ransom, you regain access to your data. Set up an automatic data backup with Langmeier Backup to avoid being blackmailed!Set up an automatic data backup with Langmeier Backup to avoid being blackmailed!

Encryption Trojans, such as Locky, Goldeneye, Spora, Rensenware, TorrentLocker, Lockerpin, Teslacrypt, and the recent Jaff and WannaCry Trojans are a particularly malicious form of malware that is playing an increasingly large role in cybercrime. The basic principle of this type of malware is quickly explained: The malware encrypts the files on a computer and at the same time irretrievably deletes the unencrypted originals. In order to recover the encrypted data, a key is needed that only the attackers know.

The extortionists make themselves pay dearly for this.

If you don't want to resign yourself to losing your data, you'll have to go along with the criminals' demand. Even the FBI can't think of a better solution, which is why the American federal police give affected people the dubious advice to pay the demanded ransom in case of emergency. At least if the damage caused by the loss of data would be significantly higher. One variant of such Trojans („Cryptowall“) alone has caused the US $18 million in damages within a year, according to FBI estimates. But whether it actually helps to give in to the extortionists' demands is anything but clear. By no means in all cases are they willing or able to actually restore the encrypted files after payment has been made. More convincing, on the other hand, are the recommendations given, for example, by the Lower Saxony police in their „Internet Crime Guide“ 


What is a Trojan? What is ransomware?

A Trojan, as the name suggests, is malware that hides behind an application or file. When downloaded or by opening infected web pages or email attachments, the transfer of this malware is started and it installs itself, without the user's knowledge, into the computer system.


The attacks with a Trojan are not new and usually occur massively where there are security holes, if, for example, updates are not made regularly. So the first measure should always be to install updates and patches and, if necessary, appropriate malware protection.


It is also important to carefully verify the origin of links and email attachments and not to open files and links without thinking, even if they seem trustworthy. For example, the Locky virus hides in email attachments that pretend to send invoices. Since it is quite common to send invoices by email these days, they are often opened. Pay attention to the extension. And under no circumstances open double endings such as „pdf.exe“.

Often the Federal Criminal Police Office or the German Federal Post Office is given as the sender of emails, which do not arouse suspicion in the recipient, and even arouse curiosity to open the attachment. Spreading in social networks is also not uncommon, as these messages with the links to the infected pages are often automatically distributed among friends and the recipient, for example, does not distrust the Facebook contact and opens the link without being asked, only to be directed to manipulated websites. Most of the time, the sender does not even know that he has distributed this link, as many backdoor Trojans send themselves. Trojan protection is useless in these cases.


With this type of attack, Trojan viruses such as WannaCry, the Locky virus, and other ransomware (extortion software) can be distributed worldwide in seconds, leading to total data loss on infected machines 


Data backup offers the only protection!

To this end, we offer Langmeier Backup, a reliable and convenient solution. An automatic backup of all important data should be an integral part of every IT security concept anyway. Encryption Trojans are further proof that mirrored hard disks or other RAID systems significantly improve the reliability of servers, but are by no means a substitute for regular automated data backup. In this case, an encryption Trojan also encrypts the redundantly existing data as well. Real security is only provided by a backup copy of the data stock on an external data medium that is safe from the Trojan's access.

Our professional backup program - the reliable solution


Missing backups are thus the most important reason why criminals are unfortunately often successful on the Internet with encryption Trojans. There is no lack of awareness of the problem. Even almost every private PC user today is aware that they should regularly create a backup.

Some, however, find this constant routine too time-consuming, while others only experience an unpleasant surprise when they have to restore data in an emergency. As long as it is only simple directories with files, usually no major difficulties occur. However, at the latest during a system restore or when restoring active databases, it often becomes apparent that by far not every data backup program is up to these requirements. Either the restore of the data fails completely, or it turns out that important data is missing, because it was in use during the backup runs.

Langmeier Backup solves these problems


Automatic backup runs reliably in the background once it is set up. Even more complex active data structures such as those of a mail or database server are reliably backed up and can be restored effortlessly. But still, of course, the same applies here: A tested recovery belongs to every professional data backup concept!

Save data automatically

Protect all your files.

  Buy Now   Try it for free Langmeier Backup for Windows

--- Anzeige ---
Langmeier Backup 8.1 - jetzt testen und sofort Daten sichern!
About the Author , Free contributor
Charles Rahm Charles Rahm is a freelancer at Langmeier Software and is responsible for search engine optimization (SEO), among other things. Charles has a passion for travel. He lives in Bangkok and runs, among other things, the travel blog Sorglos Reisen. Sorglosreisen.Com

Further lookup: automatische Datensicherung, Langmeier Backup, automatisches Backup, Daten wiederherstellen, Datensicherheit, Datenverlust, Backup, Datensicherung

Articles relevant to the topic
Langmeier Backup Version 10 ist da
FAT32 oder NTFS? Welches Format ist besser für's Backup?
Experten-Tipps: Was ist ein Backup? Gute Datensicherung

Post a comment here...

This article covers:
backup prevention malware
Langmeier Backup
Image Backup
Backup Software