Ransomware with Craig MacAlpine and Joel Witts
Easy Prey6 Touko 2020

Ransomware with Craig MacAlpine and Joel Witts

School districts, health care organizations, cities, and towns have all been victims of ransomware. Families have lost access to photo albums of 20 years of memories and personal finances. It can be a very devastating experience. It is very scary to not be able to do your job or access your data. Now attackers are not only threatening to delete your data, but they are also threatening to leak the data. This can cause lawsuits, legal ramifications, and a huge headache for businesses large and small.

What is ransomware? Ransomware is a type of malware that gets installed on your machine and it locks all of your files so you can't access them. It spreads very quickly through your computer and you may be unable to access crucial programs and files. Often you get a message from the attackers requesting money or your data will be leaked or deleted. Craig and Joel share their expert insights on how to prevent these attacks.

Craig MacAlpine is the founder and CEO of Expert Insights and a passionate security innovator with over 20 years of experience in information security and product management previously founding e-mail security company EPA Cloud.

Joel Witts is a Senior Content Editor at Expert Insights covering a multitude of areas including cybersecurity.

We talk about ransomware and best practices for protecting you, your family and your business. We specifically discuss ways ransomware can get in, how you can be affected, and ways to protect against it. We talk about secure gateway products, post-delivery protection, and isolation. This episode will help you figure out what solution can offer the best protection to your family and business.

Show Notes:

  • [01:38] - Ransomware is a type of malware that gets installed on your machine and it locks all of your files so you can't access them. It spreads very quickly through your computer and may be unable to access crucial programs and files. Often you get a message from the attackers requesting money or your data will be leaked or deleted.
  • [03:14] - With a lot of scams there is a level of emotion and urgency in the ransom component.
  • [04:50] - Travelex was hit on New Year's Eve this past year and it closed their operations down for a week while they had to go to a manual basis and had a 32 million dollar hit.
  • [06:08] - Ransomware is something that affects all the way up from small to large businesses. The most common targets are healthcare, education, towns, and cities.
  • [07:19] - The average ransom sum is increasing to over $40,000.
  • [09:01] - There is conflicting advice on whether the company should pay the ransom or not. There is no guarantee that you will get your data back.
  • [09:59] - Ransomware has become more of a well-known issue. Businesses are putting more measures in place to try and mitigate the risks from these threats.
  • [11:10] - A common way for ransomware to start in an organization is through phishing attacks which are difficult to stop. Phishing is a type of email that tries to trick a user into performing an action.
  • [13:31] - If you have got a savvy phisher whose updating that content it is really hard for the gateway systems to pick that up.
  • [14:14] - The email may be the start of the phish, but not the method that the malware is downloaded that is just where they start the conversation.
  • [17:03] - Secure gateway products usually do a good job stopping spam and phishing emails. Typically 98-99% of these threats will get stopped with those products.
  • [19:03] - Someone can get remote access to your email account and forward the emails. The user isn't even aware of what is going on in their email account.
  • [20:04] - Post-delivery protection looks for compromised accounts and phishing emails coming from a genuine internal account emailing someone else within your business.
  • [22:10] - If you are an IT manager or IT professional you're asking for trouble not installing two-factor or multifactor identification.
  • [24:17] - E-mail is your gateway to connect with someone, but the malware usually comes through the web like a download.
  • [26:34] - Isolation could be the solution, but it will be a while before this option comes to consumers. It is a process that takes a while to get to the home-use level.
  • [27:55] - With isolation videos or documents would be rendered for your viewing, but not actually be downloaded to your machine.
  • [29:43] - If someone does become a victim of ransomware what are their options?
  • [31:59] - Realistically if back-ups are not automated they are not going to happen.
  • [34:06] - The IT manager is often a jack of all trades trying to oversee the phone systems, PC updates, and more. Back-ups are not prioritized, because if something isn't broken then we don't have time to fix it today.
  • [36:13] - Over time there will be more advanced and automated systems that will block the vast majority of ransomware, but there will still be some carefully crafted scams that will be hard to catch. It will probably become less frequent, but never entirely go away.
  • [37:07] - The scammers only have to get it right once, but the people that are protecting against it have to get it right 100% of the time. There will always be an element of human mistake because of emotions and fear.
  • [39:46] - The attacks can be very effective because of fear and time sensitivity even if technologically we are able to stop them.
  • [40:28] - Great advice is to not panic if you get hit by ransomware.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Jaksot(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Huhti 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Huhti 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Huhti 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Huhti 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Huhti 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Maalis 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Maalis 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Maalis 45min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
tervo-halme
rss-podme-livebox
aihe
rss-ulkopoditiikkaa
viisupodi
rss-pinnalla
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
rss-vaalirankkurit-podcast
rss-asiastudio
radio-antro
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
otetaan-yhdet
rss-mina-ukkola
rss-polikulaari-pitka-kiekko-ja-muut-ts-podcastit