Langmeier Backup FAQ
How to protect yourself against ransomware
![]() Encryption Trojans such as Locky, Goldeneye, Spora, Rensenware, TorrentLocker, Lockerpin, Teslacrypt, and the more recent Jaff and WannaCry, represent a particularly dangerous form of malware that is playing an increasingly significant role in cybercrime. The core principle of this malware is straightforward: the malicious software encrypts files on your computer and simultaneously deletes the unencrypted originals irretrievably. To recover the encrypted data, a decryption key is required—one that only the attackers possess. Paying the Ransom: A Risky GambleIf you do not want to accept the loss of your data, you may feel compelled to comply with the criminals’ demands. Even the FBI has, in some cases, advised victims to pay the ransom if the potential damage from data loss would be significantly higher. According to FBI estimates, a single variant of such Trojans (“Cryptowall”) caused damage in the USA amounting to 18 million dollars within just one year. However, there is no guarantee that paying the ransom will actually result in the recovery of your files. In many cases, attackers are either unwilling or unable to restore the encrypted data after payment. The recommendations provided by the police in Lower Saxony in their “Internet Crime Guide” are therefore much more convincing. What Is a Trojan? What Is Ransomware?A Trojan is malware that disguises itself as a legitimate application or file. When you download or open infected websites or email attachments, the malware is activated and installs itself on your system without your knowledge. Attacks using Trojans are not new and typically occur on a large scale wherever security vulnerabilities exist, such as when updates are not installed regularly. Therefore, your first line of defense should always be to install updates and patches promptly and, if necessary, use appropriate malware protection. It is also crucial to carefully verify the source of links and email attachments and never open files or links without due diligence, even if they appear trustworthy. For example, the Locky virus often hides in email attachments that masquerade as invoices. Since it is now common to receive invoices via email, these attachments are frequently opened without suspicion. Always check the file extension, and never open files with double extensions such as “pdf.exe”. Emails are often sent under the guise of reputable organizations such as the Federal Criminal Police Office or the German Federal Post Office, which may not arouse suspicion or may even pique curiosity, prompting recipients to open the attachment. Distribution via social networks is also common, as malicious links are often automatically shared among friends. Recipients may trust the sender—such as a Facebook contact—and open the link, unknowingly visiting a compromised website. In most cases, the sender is unaware that they have distributed the malicious link, as many backdoor Trojans propagate themselves. In these scenarios, traditional Trojan protection is often ineffective. Through these attack vectors, ransomware such as WannaCry, Locky, and other blackmail software can spread globally within seconds, resulting in total data loss on infected computers. Data Backup: Your Only Real ProtectionWith Langmeier Backup, you have access to a reliable and user-friendly solution. An automatic backup of all critical data should be an essential component of every IT security strategy. Encryption Trojans have proven that while mirrored hard drives or RAID systems can enhance server reliability, they are not a substitute for regular, automated data backups. In the event of an attack, an encryption Trojan will also encrypt redundant data. Only a backup stored on an external medium, isolated from the infected system, provides true security. Our Professional Backup Program – The Reliable SolutionLack of backups is the primary reason why cybercriminals are often successful with encryption Trojans. Awareness of the issue is widespread—even most private users know they should regularly back up their data. However, for some, maintaining this routine is too time-consuming, while others only realize the importance of backups when disaster strikes. As long as only simple directories are involved, restoring data is usually straightforward. However, when it comes to restoring an entire system or active databases, it often becomes clear that not every backup solution is up to the task. Sometimes, data restoration fails completely, or important files are missing because they were in use during the backup process. Langmeier Backup: Solving the Backup ChallengeOnce configured, Langmeier Backup runs automatic data backups reliably in the background. Even complex, active data structures—such as those found on mail or database servers—are securely backed up and can be restored with ease. However, it is essential to remember: a tested restore is a vital part of every professional data backup strategy! Look it up further: automatic data backup, Langmeier Backup, automatic backup, Restore data, Data Security, Data loss , Backup, Data backup Related articlesWhich type of backup is the best choice for my data?This is how important data backup is in real life The advantages and disadvantages of the different Windows file systems This article covers the topics:MalwareBackup malware prevention Prevention |
|