wonderfully unique software solutions

Altaro e-book out on stopping ransomware in its tracks

Altaro Software has published an e-book to help customers fight ransomware – one of the most potentially devastating malware forms threatening the finances of businesses and individuals.

The backup and replication specialist explains: “Ransomware encrypts your data using algorithms that cannot be cracked or reversed in practical terms. We’re not talking about password protecting a Word document.

“We’re talking about applying things like AES 256 or other strong encryption to all your critical data, using a key that is unique to you. Either you pay up, or you lose the data.”

Defending and protecting an organisation’s computers from ransomware attacks, Altaro experts write in its free guide and associated webinar, is all about working up a good layered defence and responding appropriately should you fall victim to such an extortion attempt.

“But take heart, as this is not a lost cause nor reason to cancel your internet and go back to paper and pen. There are several things end users and businesses can do.”

Anti-virus alone won’t be sufficient, warns Altaro.

However, while no one is going to brute-force the password, or figure out a way to reverse it for you, and you can’t go online to find someone else who paid up, then posted the passphrase online, there are a series of practices that could tip the odds in your favour.

Altaro takes the reader through approaches from limiting user rights, blocking attachments, and deploying anti-malware solutions to scanning downloads, execution control and privileged-access workstations (PAWS) and much more in the 29-page guide.

Sign up to download the e-book, “Ransomware: A Survival Guide”, here.

Recent Articles

Thycotic moves up Privileged Access Management ranks for Gartner

Channel-only security specialist Thycotic has risen up the ranks in Gartner's Magic Quadrant for the expanding Privileged Access Management (PAM) market.

Ransomware protection can be as simple as encrypted iStorage

Hardware encrypted and cloud encryption storage device vendor iStorage has garnered another nod from cybersecurity experts -- this time for its ability...

Acronis enhances secure storage solution with an eye to edge performance

Acronis has updated its software-defined Cyber Infrastructure secure storage solution, with a focus on improving performance for edge workloads.

Why organisations should invest in remote endpoint and email security today

Because business customers hadn't predicted that working from home would become 'the new normal' this year, many haven't yet invested in relevant...

Tricentis to spotlight the human side of devops at October summit

Skills, cultural shifts, and philosophy are key to devops success in enterprise transformation projects, according to testing automation provider Tricentis.

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox