Presentation is loading. Please wait.

Presentation is loading. Please wait.

Offering Mission Critical Technologies (312)

Similar presentations


Presentation on theme: "Offering Mission Critical Technologies (312)"— Presentation transcript:

1 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 Protect Against Ransomware Webinar: How to Keep Your Company and Personal Data Secure October 7, 2016 Offering Mission Critical Technologies (312)

2 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 WHO IS 2W TECH? 2W Tech has a large team of KNOWLEDGEABLE IT & Epicor Consultants that work hard on your networks and systems so you don’t have to. We Provide AFFORDABLE and RELIABLE IT Support. Epicor Solutions: Epicor Consulting Epicor installations & upgrades Epicor Service Plans Legacy system support Customizations Epicor system design Managed Epicor IT Epicor Project Mgmt. Infrastructure Solutions: Backup and Disaster Recovery Cloud solutions Hardware solutions IT Consulting Network Assessments Software solutions Vendor Management Virtualization Managed Services: 24X7 remote monitoring and maintenance of networks, software, hardware and other related IT services for your organization. The best choice for IT or Epicor support: 2W Technologies, INC Offering Mission Critical Technologies (312)

3 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 Webinar Presenter: Mark Canfield, Senior Consultant at 2W Tech Over 30 years working with IT Infrastructure solutions and Managed Services Former owner of a large IT and Internet Company in Cleveland, Ohio Areas of expertise include: LAN/WAN design, Systems design, and Disaster Planning Design & Implementation SonicWALL certified Offering Mission Critical Technologies (312)

4 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 CryptoLocker and Ransomware Offering Mission Critical Technologies (312)

5 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 CryptoLocker and other Ransomware CryptoLocker is a form of ransomware that uses a business model based way of extorting money from users. The ransom can cost you anywhere from $200 on the low end, up towards $18,500, which is the highest reported amount. Cyber-criminals collected $209 million in the first three months of 2016 by extorting businesses and institutions to unlock computer servers. At that rate, ransomware is on pace to be a $1 billion crime this year. Believed to have been first posted to the Internet in September 2013. New variations of CryptoLocker are introduced constantly. Offering Mission Critical Technologies (312)

6 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 What is CryptoLocker? CryptoLocker is a Ransomware Trojan that targets computers running Microsoft Windows, designed to extort money from users. CryptoLocker has affected many by restricting user access by not just locking the system, but also by encrypting certain files, hence the name CryptoLocker. When activated, the malware encrypts certain types of files stored on local and network drives so they cannot be opened. The malware then displays a message which offers to decrypt the data if a payment is made by a stated deadline. Infected files are encrypted with sophisticated a algorithm which makes nearly impossible to decrypt. Offering Mission Critical Technologies (312)

7 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 Locky Ransomware Locky has been one of the more upgraded malware types, which is one of the reasons it has been so successful.  The basic delivery mechanism has remained the same, using spam s and infected attachments, the attackers have rotated through several types of attachments such as .doc, .rar, .wsf, and JavaScript. Experts believe Locky will continue to evolve, meaning next could be the use of executable files such as .com, .bin, and .cpl to distribute this threat. Many attacks happened with simple, common subject lines having to do with everyday corporate practices, such as audit report, budget report, and payment receipt. Offering Mission Critical Technologies (312)

8 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 How to Prevent CryptoLocker Perform regular backups of important files and systems, keeping the backups stored off site. This will help mitigate the damage caused not only by malware infections, but hardware problems or any other incidents as well. Always keep your operating system and software up-to-date. Be particularly cautious of s from senders you don’t know, especially those with attached files. Do not follow un-trusted web links in messages or submit any information to web-pages in links. Offering Mission Critical Technologies (312)

9 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 How to Prevent CryptoLocker (cont.) Keep your antivirus up-to-date, and perform weekly full system scans. Conduct a custom antivirus scan of any application and file downloaded from the internet before you proceed with its downloading/installation. Ensure the scanning feature of your antivirus software is configured and enabled. Disable hidden file extensions in Windows. Be sure that you have a firewall that blocks attacks at the edge by using Deep Packet Inspection and that the firmware is up to date. Offering Mission Critical Technologies (312)

10 www.2wtech.com Software that Powers Your Business (312) 533-4033
5/8/2018 Protecting Yourself Be suspicious of any that requires “immediate action” or creates a sense of urgency. Be suspicious of s addressed to “Dear Customer” or some other generic salutation. If it is your bank they will know your own name. Hover your mouse over the link to see true destination. Do not click on links in . Be suspicious of grammar or spelling mistakes. Be suspicious of attachments and only open those you were expecting. Just because you got an from your friend does not mean they sent it. Stay diligent, things change quickly. Train yourself and the rest of your staff. Software that Powers Your Business (312)

11 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 Validate Shortcuts/Links Be mindful of search results The first link is not always the correct one. Sponsored/ad redirected results can’t always be validated. Many malicious websites attempt to mimic legitimate sites either in appearance or by the domain name. Example: MonPower.com is a website on the internet The URL and site are designed to mimic the real utility website. is the real website Offering Mission Critical Technologies (312)

12 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 What happens if I get CryptoLocker? If you suspect a machine is infected, immediately disconnect that machine from the network, as the virus can migrate to other machines. Call your IT provider IMMEDIATELY HOPE, HOPE, HOPE you have a good, recent backup of your files and systems. Offering Mission Critical Technologies (312)

13 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 BACKUPS Offering Mission Critical Technologies (312)

14 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 BACKUPS Data backup is undoubtedly one of the most effective strategies against ransomware attacks. It may not prevent an attack, but it will allow you to recover files and restore operations without paying a ransom. Old manual back processes including use of tape, USB drives, and other external media is simply not an effective back up strategy in today’s fast pace technology environment. As a network grows and becomes more disparate (laptops, tablets and other devices), organizations need a better, more comprehensive backup strategy to protect them from CryptoLocker and other disasters. Offering Mission Critical Technologies (312)

15 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 Typically, there are two options for backing up your data, and they are an external drive or the cloud. Unfortunately, ransomware viruses like CryptoLocker, can attack your drives and encrypt even primary local backups attached to your network. That leaves organizations looking for secure, off-premise backup. 5 Point Successful Back up Strategy On-site storage Off-site storage File level back up Image back up Easy to manage, deploy and restore Offering Mission Critical Technologies (312)

16 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 Offering Mission Critical Technologies (312)

17 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 2W Tech’s Cloud Backup & Disaster Recovery Solution Your only real protection is good real-time file level and image back-ups both on-site and stored in the cloud. It's not enough just to have local protection, it's important to have a secondary site that is safeguarding your data and applications 2W Tech partnered with Axcient to bring you a solid, affordable solution to back up your critical servers and files. . This hybrid cloud solution provides businesses the ability to protect their IT environment locally and in the cloud. Offering Mission Critical Technologies (312)

18 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 Data Recovery From Any Point in Time Data protection and recovery in one integrated solution. Axcient takes a snapshot image of your physical and virtual servers, laptops and workstations. It then saves a copy of that image in the local appliance and securely encrypts the data in transit and at rest in our data centers. Whether you need to recover files, s, databases, or an entire server image, you can select your recovery point from just a few minutes ago to days, weeks, or months ago. Plus, in case you need to failover a server, you can select a specific point-in-time image snapshot to failover from. Offering Mission Critical Technologies (312)

19 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 Product Demo: 2W Tech’s Backup & Disaster Recovery solution Offering Mission Critical Technologies (312)

20 www.2wtech.com Offering Mission Critical Technologies (312) 533-4033
5/8/2018 Q & A Session Thank you for attending this webinar! If you are interested in learning more about 2W Tech’s Backup & Disaster Recovery solution, please me and I will get you more information. *Attendees of this webinar will receive a discounted price on 2W Tech’s Backup & Disaster Recovery solution* Send to Feedback on this webinar is welcome and appreciated! Offering Mission Critical Technologies (312)


Download ppt "Offering Mission Critical Technologies (312)"

Similar presentations


Ads by Google