Cookies

We use cookies to help us provide you with the best experience, improve and tailor our services, and carry out our marketing activities. For more information, including how to manage your cookie settings, see our privacy notice.

OK

Skip to content. | Skip to navigation

We’ve made our member-only resources free to everyone because of the current situation. We think it’s important people have the guidance they need to run their organisations during this time.

If you want to find out more about how you can volunteer to help deal with coronavirus, see our volunteering and coronavirus page.

If you are looking for advice on coronavirus and your charity, please see our dedicated coronavirus page.

Community-made content which you can improve Case study from our community

How to protect yourself from Cryptolocker and other ransomware

Cryptolocker is a nasty threat sneaking around the internet masquerading as a pdf file. This type of virus is known as ransomware because it targets files and then locks them up until you pay the demanded ‘ransom’.

Typically, the ‘virus’ will enter your system disguised as an innocent file attachment from a major delivery service offering tracking information or confirming money transfer. Once you have clicked to access the file, the virus will begin to search your machine for files with common extensions such as .doc, .xls, .pdf etc, encrypt those files, then contact the user to demand payment.

Anti-virus and malware tools will remove it, but files that have been infected will remain encrypted unless a payment is made, so it’s essential to prevent infection. The following is a guide to some of the ways you can protect your systems.

1

Beware of attachments

It goes without saying: you should never open an attachment if the email looks at all suspicious, even when the sender appears to be someone you know, and even if the file does not appear to be an executable (.exe) file.

2

Adjust your browser settings

You can enable phishing and malware protection, and block known attack sites in most browsers. Find out more at the links below.

Chrome

Firefox

Internet Explorer

3

Enable blocking in MS Office

If you are a Microsoft Office 365 user, you can block receipt of all attachments that contain .exe files via Admin Settings. Find out more at Microsoft Technet.

4

Enable system restore

On Windows PCs, enabling system restore will create a restore point before any major system change that will allow you to roll back your system to its previous status before the change was made. However, this will only affect installed programs and system configurations, not your data.

5

Use cloud storage

More and more organisations are turning to secure cloud storage for their data. Files accessed via the web, rather than your own hard drives or memory sticks, will be inaccessible to ransomware.

6

Review your backup procedures

If the worst comes to the worst, make sure you have made adequate arrangements to enable a full file restore if needed.

Further information

Content for this How To was provided by WorkPlaceLive, an NCVO trusted supplier. Visit their website for further information on cloud hosted services.

Contributors

Page last edited Jul 10, 2017 History

Help us to improve this page – give us feedback.