Ransomware Awareness
So what can you do about this? The first step is to keep your computer’s anti-malware and web filtering software up to date, which will block most ransomware. If you or your IT person are not sure if you have the right tools, hire an external security expert evaluate your applications and security configuration and make recommendations. The next step is to ensure you have separate backups/shadow copies of your data offsite (and not connected to your network), so it can be restored to a specific point in time. Many users have backup systems that synchronize ALL files between their laptop and a cloud systems so they are exactly the same, which invariably ensures that the malware is backed up as well. Keeping separate weekly images on external drives or cloud services will allow you to restore to a specific point in time before the virus was invoked. User file access permissions should be limited where possible, meaning that if everyone has “administrator” rights, any of these users could potentially infect ALL the files on the network! Finally, it’s very important to educate your personnel about “suspect” email attachments that introduce the virus. Examples include unsolicited banking notices, shipping notices, or airline ticket invoices from a vendor you have not done business with that makes demands explained “in the attached document.”
If you do become a victim of ransomware, notify your IT person immediately to assess the situation and discuss remediation options. In some cases they can work around the screen-lock version, but if your files are encrypted, you are out of luck. If you determine that you do not have any way to recreate/restore the data and a decision is made to pay the ransom, have your IT person pull off the needed files from the infected computer (after the decryption) to a separate drive (not attached to the network), thoroughly scan the data to remove any malware, and then reformat and rebuild the computer, before restoring the cleansed data. If you don’t do this, there is a chance the infection is still present and there is nothing stopping the criminal from hitting you up again.
Roman H. Kepczyk, CPA.CITP, AAAPM, and Lean Six Sigma Black Belt is Director of Consulting for Xcentric, LLC and works exclusively with accounting firms as an outsourced, independent IT partner to optimize internal production workflows within their tax, audit, client services and administrative areas. His Quantum of Paperless Guide (Amazon.com) outlines 32 digital best practices all accounting firm partners need to understand today as well as the 2015 AAA paperless benchmarks.