• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Learn from These Mistakes of Past Cyber-Terrorism Victims

April 16, 2019Simeon Georgiev

It is a very famous and eminent proverb that:

 “A wise person learns from his mistakes. A wiser one learns from others’ mistakes. However, the wisest person of all learns from others’ successes.”

There are people and companies out there who have admitted to their mistakes and allowed to be shared online to prevent others from being manipulated by cybercriminals. Below, we will mention some of such mistakes that you can learn from the past cyber-terrorism victims to save your company’s time, money, brains and of course, the data and confidential information. These mistakes will also help you devise a rasomware recovery plan.

1)    Selecting informal and laid-back passwords

Choosing easy passwords is only a magnet for cybercriminals to dig deeper into your data and gain easy access to it. Such passwords are insecure and publicly accessible.

The cybercriminals won’t have to go any further if you try it at home with your personal computer and you assign someone as an experiment to try and guess your password. They will go for the easiest and the quickest ones keeping you in mind. Easy passwords include:

–    Your initials

–    Name of a pet or loved one

–    The company’s street address

–    Your boss’ name

–    Even if you have little sticky notes on your computer, it may be possible that a customer comes and takes a look around and somehow takes a picture of the sticky notes and guesses the password because of that. So remember NEVER to write the password on sticky notes. There could be under-cover cybercriminal looking for little clues to work their way through your system.

2)    Inconsiderate, careless administrators

This is one of the biggest mistakes that victims of cyber terrorism have made. Once a cybercriminal gets hold of a careless administrator’s attention by sending out various emails through several means for his attention, the cybercriminal can quickly get into the administrator’s access.  This way, eventually, the information can go as deep and as thorough as knowing even the number of pets you have (through social media accounts), the vacation places you visited, the name of your spouse and their interests and hobbies.

Having a considerate, careful administrator should be a number one priority to save yourself from cyber terrorism.

3)    Untidy Server System

New companies have admitted that the biggest mistake they ever made was not to change the password that IT experts once gave them at the beginning of the setup, which was as easy as “1234” or the name of the country they were residing in.

Due to lack of time and money as well as resources, (or could be the sloppiness of the company’s IT expert), the new companies admitted that they didn’t worry much, weren’t copious enough about the server setup once it had been activated and ran successfully. They tend to forget, and this leaves the biggest hole in their system for the cybercriminals to implant their ways and make your ransomware recovery plan a failure.  

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post The Importance of Giving Security Awareness Training to Your Employees Next post Are Cyber-Terrorism Threats to Elections Real?

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.