Langmeier Backup FAQ
How to protect yourself against ransomware
![]() Encryption Trojans such as Locky, Goldeneye, Spora, Rensenware, TorrentLocker, Lockerpin, Teslacrypt and the recent Trojans Jaff and WannaCry are a particularly malicious form of malware that is playing an increasingly important role in cybercrime. The basic principle of this type of malware is quickly explained: the malware encrypts the files on a computer and at the same time irretrievably deletes the unencrypted originals. In order to restore the encrypted data, a key is required that only the attackers know. The blackmailers pay dearly for this.Anyone who does not want to accept the loss of their data must give in to the criminals' demands. Even the FBI cannot think of a better solution, which is why the American federal police give those affected the dubious advice to pay the ransom demanded in an emergency. At least if the damage caused by the loss of data would be significantly higher. According to FBI estimates, one variant of such Trojans ("Cryptowall") alone caused damage to the USA amounting to 18 million dollars within one year. But whether it actually helps to give in to the blackmailers' demands is anything but clear. By no means in all cases are they willing or able to actually restore the encrypted files after payment has been made. The recommendations made by the police in Lower Saxony, for example, in their "Internet Crime Guide" are more convincing. What is a Trojan? What is ransomware?A Trojan is, as the name suggests, malware that hides behind an application or a file. When downloading or opening infected websites or email attachments, the transmission of this malware is started and it installs itself into the computer system without the user's knowledge. Attacks with a Trojan are not new and usually occur on a massive scale where there are security gaps, e.g. if updates are not carried out regularly. The first measure should therefore always be to install updates and patches and, if necessary, appropriate malware protection. It is also important to carefully verify the origin of links and email attachments and not to open files and links without due diligence, even if they appear to be trustworthy. For example, the Locky virus hides in email attachments that pretend to be an invoice. As it is quite common nowadays to send invoices by email, these are often opened. Pay attention to the ending. And never open double endings such as "pdf.exe". Emails are often sent from the Federal Criminal Police Office or the German Federal Post Office, which do not arouse the recipient's suspicion or even curiosity to open the attachment. The distribution in social networks is also not uncommon, as these messages with the links to the infected pages are often distributed automatically among friends and the recipient, for example, does not distrust the Facebook contact and opens the link without being asked in order to be directed to manipulated websites. In most cases, the sender does not even know that they have distributed this link, as many backdoor Trojans send themselves. Trojan protection is useless in these cases. With this type of attack, Trojan viruses such as WannaCry, the Locky virus and other ransomware (blackmail software) can be distributed worldwide in a matter of seconds and lead to total data loss on infected computers. Data backup is the only protection!With Langmeier Backup, we offer a reliable and convenient solution for this. An automatic backup of all important data should be an integral part of every IT security concept anyway. Encryption Trojans are further proof that although mirrored hard disks or other RAID systems significantly improve the reliability of servers, they are by no means a substitute for regular automated data backups. In this case, an encryption Trojan also encrypts the redundant data. Only a backup copy of the data on an external data carrier that is safe from access by the Trojan offers real security. Our professional backup program - the reliable solutionA lack of backups is therefore the most important reason why criminals are unfortunately often successful with encryption Trojans on the Internet. There is no lack of awareness of the problem. Even almost every private PC user today is aware that they should regularly create a backup. For some, however, this constant routine is too time-consuming, while others only experience an unpleasant surprise in an emergency when they have to restore data. As long as only simple directories with files are involved, there are usually no major difficulties. However, when it comes to restoring a system or active databases, it often becomes apparent that not every data backup program is up to the task. Either the restoration of the data fails completely or it turns out that important data is missing because it was in use during the backup runs. Langmeier Backup solves these problemsThe automatic data backup runs reliably in the background once it has been set up. Even more complex active data structures such as those of a mail or database server are reliably backed up and can be easily restored. But of course the same applies here: A tested restore is part of every professional data backup concept!
Langmeier Backup Backup for WindowsLook it up further: automatic data backup, Langmeier Backup, automatic backup, Restore data, Data Security, Data loss , Backup, Data backup Related articlesWhich type of backup is the best choice for my data?This is how important data backup is in real life The advantages and disadvantages of the different Windows file systems This article covers the topics:MalwarePrevention Backup malware prevention |
|