Skip to main content
#
Helpico Insurance
home
contact
site map
email usour twitterour facebook page pintrestgoogle plus youtube
Email
Twitter
Facebook
LinkedIn
Google+

How to defend against ransomware

 

In September, the FTC hosted a workshop on ransomware, one of the most serious online threats facing people and businesses today — and the most profitable form of malware criminals use. How does ransomware work? Hackers hold your files “hostage”— often encrypting them — then demand payment, typically in bitcoins, for you to get them back.

Missed the workshop? Check out our videos featuring conversations with security researchers, technologists, law enforcers, and business leaders. Want some bite-sized takeaways? Here are some tips to protect your devices from ransomware, and what to do if you’re a victim.

How can I defend against ransomware?

  • Update your software. Use anti-virus software and keep it up-to-date. And set your operating system, web browser, and security software to update automatically on your computer. On mobile devices, you may have to do it manually. If your software is out-of-date, it’s easier for criminals to sneak bad stuff onto your device.
  • Think twice before clicking on links or downloading attachments and apps. According to one panelist, 91% of ransomware is downloaded through phishing emails. You also can get ransomware from visiting a compromised site or through malicious online ads.
  • Back up your important files. From tax forms to family photos, make it part of your routine to back up files on your computers and mobile devices often. When you’re done, log out of the cloud and unplug external hard drives so hackers can’t encrypt and lock your back-ups, too.

What if I’m a victim of ransomware?

  • Contain the attack. Disconnect infected devices from your network to keep ransomware from spreading.
  • Restore your computer. If you’ve backed up your files, and removed any malware, you may be able to restore your computer. Follow the instructions from your operating system to re-boot your computer, if possible.
  • Contact law enforcement. Report ransomware attacks to the Internet Crime Complaint Center or an FBI field office. Include any contact information (like the criminals’ email address) or payment information (like a Bitcoin wallet number). This may help with investigations.

Should I pay the ransom?

Law enforcement doesn’t recommend paying the ransom, although it’s up to you to determine whether the risks and costs of paying are worth the possibility of getting your files back. If you pay the ransom, there’s no guarantee you’ll get your files back. In fact, agreeing to pay signals to criminals that you haven’t backed up your files. Knowing this, they may increase the ransom price — and may delete or deny access to your files anyway. Even if you do get your files back, they may be corrupted. And you might be a target for other scams.

 PRIVACY/DATA BREACH CYBER LIABILITY PREMIUM INDICATION FORM

(Completion of this form does not guarantee a contract of insurance. This is for a non-binding “Premium Indication” only. Premiums are subject to change upon full completion of a Cyber Liability Application.)
APPLICANT INFORMATION
Name of applicant: ____________________________________________________________
Address of applicant:___________________________________________________________
City: ____________________________ State: ________ Zip: ______________
Telephone: ______________________ Website address: __________________________
General description of operations of applicant:
_______________________________________________________________________________
Number of employees: ______________ Annual revenue: ____________________________
How many electronic records (customers or employees) containing personally identifiable
information are held by the applicant? ________________________________
(Please circle)
1. Does the applicant control access to the computer system? Yes No
2. Does the applicant have a firewall? Yes No
3. Does the applicant have a virus protection program in place? Yes No
4. Does the applicant outsource any part of the internal networking/computer
system or internet access to others? Yes No
5. Does the applicant have a person responsible for IT security? Yes No
6. Does the applicant’s hiring process include criminal background checks? Yes No
7. Does the applicant have a written security policy? Yes No
8. Does the applicant test their security or privacy controls? Yes No
9. Has the applicant ever experienced a privacy or data breach? Yes No
10. Does the applicant allow employees to download personal client information
or other confidential information onto laptops or other data files? Yes No
(If yes, is the data encrypted?) Yes No
11. What personal client or employee information is held? (Check all that apply)
Social Security Numbers Driver’s License Numbers
Financial Account Numbers Credit Card Numbers
Personal Health Information Other (please specify) ______________________
12. Has the applicant ever filed a Privacy/Data Breach claim? Yes No
(If “yes”, please note date of incident and provide brief explanation)
_____________________________________________________________________________
I understand that this is a non-binding premium indication for Privacy/Data Breach Cyber Liability coverage. To receive a bindable quote, I/my client must complete the Cyber Liability application.
Applicant or Agent Signature: _____________________________________ Date: _________________
Cybersecurity Humor

Phone: **Ring, ring, ring**
Person 1: “Hello?”
Person 2: “Hi, I’m from the utility company. We wanted to see if your smart refrigerator was running. Can you check?”
Person 1: “Yes, yes it is.”
Person 2: “Well, you better catch it before it shares your personal information with cyber criminals!”

These days, even our refrigerators are connected to the Internet. Internet-connected devices – including life-saving medical devices, wearable fitness trackers, appliances, and smart thermostats –  bring tremendous convenience to our lives, but they are also potential targets for cyber criminals looking to steal consumer information.

Keep your personal information and identity safe from cyber threats by reading privacy policies – make sure you know what information a device or app will collect from you, and research the device manufacturer’s reputation. Also use strong passwords on these devices and perform regular updates to avoid viruses and malware. Check out our Internet of Things Tip Card for more information.

Site Mailing List  Sign Guest Book  View Guest Book 
Insurance Services for Risk and Assets Management
1043 S York Rd LL3, Bensenville IL 60106
©Anna Ruseva - Helpico Insurance Agency












Powered By: Insurance Web Designs, Inc.
Insurance Websites, Templates & Designs | webmail login | admin login
Your SEO optimized title