Page 44 - index
P. 44







It is worth noting that software such as Malewarebytes can remove the CryptoLocker virus from
infected computers, but unfortunately it does not recover the infected files themselves. So sadly, the
matter of fact remains: if there are no existing previous unaffected copies of the files, then files
affected by CryptoLocker will be difficult, if not impossible to recover.


Avoiding CryptoLocker?

As previously mentioned, the only true ways to avoid being a victim of the CryptoLocker
ransomware is by using good prevention. Keeping spare copies of our files on a separate drive is a
best practice all around, though of course it is not always allowed by certain workplaces. But at
least when it comes down to individuals, the best advice is: backup, then backup, then some
more backup!

Of course, viruses don’t just get magically born, they often come from low security websites and
websites which provide dubious content such as some file sharing services providing pirated
movies and music downloads; and other content which is not safe for work.

Viruses mostly get caught by people so enforcing strict staff web browsing guidelines, as well as
good staff training should limit those unfortunate instances.

Beyond prevention and upon realizing a computer is infected with ransomware, the best bet is to
contact a data recovery company, as they know what they are doing and are some of the rare
people in a position to be able to help recover some of the files.

Like with a lot of viruses, prevention is key. It is vital to use safe practice and also to use appropriate
anti-virus software which can detect early instances of the virus before it spreads to the rest of the
computer; if not the whole network of computers!




About The Author

Jean Lewis is a Tech writer at laptopical.com. He is passionate about
computers, the internet, videogames and the Geek culture. He writes about
technology in order to help people understand the common practices used in
today’s modern digital world.

Jean can be reached online at [email protected] and at his company
website http://www.laptopical.com/










44 Cyber Warnings E-Magazine – September 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   39   40   41   42   43   44   45   46   47   48   49