Ransomware 101: Hacking’s Latest Tricks
Understanding The Far Reaching Impact Of Ransomware
One of the common misconceptions surrounding ransomware is that it is only an “on-premise technology threat.” In fact, ransomware is more intricately linked than the latter statement suggests. When a user is attacked with a ransomware file, the malicious code will lock files on the computer. However, if the user is logged into a local network, then the files on additional computers and shared drives will also be impacted. Many users think that the trail stops here; this is not the case. If left unchecked, ransomware can spread to Google Apps data, as well as your Google Drive account.
How Can Ransomware Affect Google Drive?
The Google Drive sync feature allows users to automatically combine their local computer files with any Google Drive copies. Through this feature, users can work on files offline. When users reconnect to the Internet the file changes are automatically synced with the copies on Google Drive. While this is a convenient feature, it does create a security vulnerability.
If a computer is infected with ransomware and then syncs to Google Drive, it will corrupt both versions of the files. The impact is extended if a user is collaborating with other employees via Google Drive. Ransomware can then quickly spread across all shared files and folders, which creates an even larger security threat. Unfortunately, according to a Google Products expert June 7, 2016 statement in an online Google Drive Help Forum, “Encrypted ransomware files will sync back to the Google Drive server. You may be able to restore the files to a previous version but unfortunately, there isn’t much of a solution besides this. Best of luck to you!”
What Can Companies Do To Protect Their Google Drive Accounts?
Taking precautionary security steps and educating your employees about ransomware attacks are the first steps that companies can take to protect their local and Google Drive files. An SaaS backup can also be conducted on Google Apps to further protect, Google Mail, Drive, Contacts, Sites, and Calendar from an attack. This SaaS backup creates an independent copy that will allow you to restore your data to their state before the files were encrypted with ransomware.
Our SECaaS program is only the first of our five cyber security services. Even more security, custom fitted to your company’s needs? How could you NOT want to learn more about our cyber security services? Don’t worry — we’ll tell you everything you want to know!
Was this article helpful?
For more information about how Domain Computer Services can benefit you.
Hiring third-party vendors to provide services at an affordable rate has gained traction as a major trend among businesses, and exponentially so for businesses in need of IT support. Here’s the catch: “risk” is a pretty broad umbrella term, with no two vendors or regulators defining risk in the same way. To effectively create assessments for third-party vendors, let’s break “risk” down.
Updated: Nov 6, 2018 Our 12-month forecast on Cloud migration, backup and disaster recovery plans, and other agile technology movements making waves in your industry. Moving to the Cloud Multi-Factor Authentication Cloud computing has taken the business world by...
The most influential component of a successful cyber security program to ensure your business maintains regulatory compliance for EU GDPA, NYDFS and HIPAA are effective policies and procedures designed for your business. With our CISOaaS solution, you can rest assured that your cybersecurity situation not only meets, but exceeds expectations.