Page 25 - Cyber Warnings
P. 25








● Open .JS files with Notepad by default. There’s a surprising volume of malware that
uses JavaScript as a delivery medium - by setting JS files to be opened with Notepad
(and not run automatically), you can effectively neuter such malware.


● Display file extensions at all times: Plenty of malware works by obfuscating the file
extension or filetype. By setting your system so it displays extensions, you can ferret
those malicious apps out.


● Disable macros in Office documents. Self-explanatory. Most of the time, you won’t need
macros.

● Disable administrative permissions for regular users. Although ransomware can run
without elevated permissions, preventing regular employees from running apps as
administrators can prevent it from encrypting everything - it’ll only lock down files that the
infected user can access.

● Disable RDP. The Remote Desktop Protocol is a frequent attack vector for many of the
most popular ransomware tools - disable it if your employees don’t require it as part of
their workflow.

● Limit access. Do end users really need to access every mapped network drive in your
organization? Probably not.


Closing Thoughts

Like it or not, cybercriminals are getting craftier. They’ve realized that while they can certainly
steal and sell sensitive files like healthcare records or financial documents, it’s often far easier to
simply hold those files for ransom. After all, you’d be surprised what some people will pay when
their business is on the line.

By following the steps we’ve outlined in this piece, you can effectively protect yourself from all
but the worst ransomware. Just remember one thing, though: no organization is completely
immune to attack. Complacency is your worst enemy here; above all else, you need to stay
vigilant.


About The Author

Max Emelianov started HostForWeb in 2001. In his role as HostForWeb’s
CEO, he focuses on teamwork and providing the best support for his
customers while delivering cutting-edge web hosting services. Max can be
reached on Twitter at @HostFW.







25 Cyber Warnings E-Magazine – August 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   20   21   22   23   24   25   26   27   28   29   30