REMOÇÃO DE AMEAÇAS

Armazenar com segurança seus arquivos importantes e protegê-los de Malware

INFECTADOS
O século 21 - estamos vivendo em tempos voláteis e com o surgimento de novas tecnologias e mais recentes, estamos atingindo velocidades de transferência de dados e poder que está além de nossa imaginação. Contudo, com o poder vem a responsabilidade, porque estamos usando essa tecnologia para armazenar nossos arquivos importantes. Estamos falando de fotos de família, memórias importantes, arquivos secretos, e outros dados sobre os quais dependem fortemente. Este é o local onde os criadores de malware ver uma grande oportunidade para ganhar dinheiro, projetar malwares criptografia de arquivos ou tela de bloqueio tipo de software para usuários extorquir.

Quais são os riscos de hoje?

Esta é uma pergunta muito boa, porque é confiável em tantos fatores. Para respondê-la corretamente, devemos dividir os dois tipos de armazenamento de dados usuários:

Tipo 1: O usuário doméstico médio

O usuário médio geralmente mantém os dados importantes em seu computador, mas também a maioria dos usuários com alguma experiência como usar unidades externas, nuvem ou criptografia de arquivos, ele realmente depende da importância dos dados. É uma prática comum para a maioria dos usuários não armazenar seus dados de uma forma paranóica, especialmente em PCs domésticos, porque ou não têm o conhecimento ou os dados não é tão importante para eles. Esses computadores podem armazenar dados como fotos de família, projetos escolares, trabalhos de pesquisa de estudante e outros dados. Se os arquivos são perdidos, o impacto pode variar de uma dor de cabeça para um semestre em ruínas de um estudante. Os ataques de malware são principalmente através de campanhas de spam em massa que são visíveis publicamente, intrusões em vez de direcionados individualmente.

Tipo 2: O usuário de negócios

Este tipo é um pouco mais avançado. Aqui temos pessoas que são exclusivamente focados em manter os dados unicamente a seu critério ou a critério da organização. Estes tipos de usuários geralmente não usam redes domésticas para conectar suas máquinas comerciais. O uso de sistema anti-malwares avançada que inclui firewalls, proxies, VPNs e hardware proteção mesmo (caixas de VPN, várias camadas de firewalls) dá camada de protecção adicional. Não apenas isso, mas esses usuários estão também a ficar constantemente educados sobre como usar a web de forma segura e que é o mais recente desenvolvimento na malwares. Contudo, por outro lado, este é o melhor cenário. Muitas vezes vemos usuários de negócios que práticas de segurança desrespeito e até mesmo se eles não ignorá-las, they often tend to make a mistake sooner or later and get infected with malware. A wise man once said that a large percentage of data compromising in companies is due to human error, for example someone may say a password if he or she is drunk on a party. This is why with business users we mostly see targeted attacks, instead of massive ones.

Since data protection is crucial for all types of users, we at SensorsTechForum have decided to conduct research based on a voting poll and a bit of experience to establish how users tend to protect their important data nowadays. We have decided to provide users with the following options:

  • File encryption on the PC.
  • External drive storage.
  • Cloud backup or storage.
  • The data being hidden on the computer.
  • The data being stored on another partition.
  • The data being backed up using a local backup of the PC.
  • De outros.

Here are the results of the voting poll by approximately 200 Comercial:

How-You-Store-Data-Sensorstechforum

When we take a quick look, most users prefer to use simpler methods such as backing up their files online or using a USB flash stick or another external device to store their files. These methods are very suitable in some particular situations, mas nem todos. But we also see people who genuinely believe they are protected and store the data on their PC. We have managed to notice that almost nobody chooses to use the local OS backup provided by default, which is quite interesting. The conclusion for the research is that people prefer simplicity when they are securing important files. Contudo, it is crucial to note that for different types of users, different file protection methods are appropriate. This is why we have decided to review all of them so that you can choose the appropriate one which will fit your needs.

Keeping The Files On External Drives

This method is really “old school” and the word “old” from these two is a bit more appropriate. This is because of malware such as “USB Thief” being created specifically to steal information from computers and USB drives. Não apenas isso, but such malware may make your flash drive a payload carrier, meaning that it can spread to other computers it has come across with. Não apenas isso, but advanced ransomware such as Cerber, Locky ou TeslaCrypt variants may be configured to encrypt files that are located on other flash drives or partitions, which may be fatal if you insert your external drive in a ransomware-infected computer. além disso, there may also be other risks with external drives, such as the possibility of them breaking with time. Isso é por que, extreme attention on care should be taken, such as changing the external drive to a newer one, so that the files may remain in good health. Como uma linha de fundo, we would recommend using this method only if you are a home user and keep your system secure and most importantly if you are using the flash drive rarely, meaning that it is appropriate for old files, photos etc.

Storing the Data In The Cloud

With file tampering malware infections on the rise, cloud backup has sure gained a lot of popularity nowadays. This is because some users do not tend to have the time to deal with flash drives, securing their PCs by buying anti-malware tools and other headaches. The other reason for preferring cloud backup is that some cloud backup programs, como o SOS Online Backup, offer unlimited data storage, and this is very suitable for people with a lot of terabytes at their disposal. Contudo, you have to know that cloud backup also conceals certain risks, por exemplo, an Infostealer Trojan like Banload, may steal your username and password and gain access to your files, so this “security bottleneck” is something that you should consider if you are using cloud backup. There is also a risk of a keylogger being executed in an obfuscated manner which steals your credentials by collecting keystrokes, como https://sensorstechforum.com/remove-msil-stimilik-terminate-fade-exe-keylogger/ MSIL/Stimilik keylogger. Para combater isso, it is advisable to use Anti-Logger software, like Zemana’s. As a final word for this file storage method we would say that it is appropriate for home and business users as long as you have enough trust with your data to the company storing it on their servers.

By Encrypting the Files On Your PC

Data encryption software that hides the files on your computer in plain sight is a very clever way to store them. De fato, most government agencies use this method of storing secret files on their servers. To encrypt the data of their files they use encryption algorithms that are very strong and classified as a Suite B category for top secret files. Contudo, there are risks with that as well, because first, no code is perfect and an encryption software often generates a unique decryption key for the files. With sufficient access, these “encryptors” can be exploited and the keys discovered. There are also other risks with encryption software, por exemplo, the encrypted files may damage over time and become impossible to decrypt with their key. So it is important to use software that has a strong algorithm and can not only encrypt your files but also give you other options, gostar APO Encryption Standard Edition for PC which uses AES-256 cipher. The bottom line is that we recommend file encryption to users who store extremely important data that is for their eyes only.

Using the Local OS Backup of Your Device

Compared to the above-mentioned methods, this method is way less secure, and this may be one of the reasons only 3% of the voters prefer it. Local backup can be made to look like a joke in front of malware, especially on Windows systems. Imagine the following scenario: You click on a malicious URL, believing it is sent to you by a via a message and you experience the so-called drive-by infection after which your computer has ransomware, gostar No entanto, that encrypts your files with a strong RSA encryption algorithm. Will you use your backup to restore them? Claro. But most malware writers know of such possibility, and this is why to ensure themselves that your files may temporary be their property, they execute the following administrative command in Windows Command Prompt which deletes your backup:

→ vssadmin sombras apagar / for ={DrivePartition} [/mais velho | /todos | /sombra ={Identificação das cópias de sombra}] [/quieto]

And suddenly, you have to pay ransom money in BitCoins to unlock your files. Claro, you may salvage a small percentage of the data using data restoration programs, gostar Stellar recuperação dos dados de Windows, ou Data Recovery Android Pro for mobile devices but few recovered files are the best case scenario. So we would recommend you not to use your local backup for data keeping.

By Keeping the Files Hidden from Sight On Your PC

This is the oldest trick in the book, and it will not protect your files from malware and from people who know how to find hidden files on your computer. If you are going to take advantage of this method, we advise using it to hide data that is not so important for you, but you do not wish other users on the computer to see it and if you are going to hide files this way, we recommend using scrambled names so that people cannot discover it via filtered search. De qualquer jeito, this method is an extremely bad idea in most cases, and we advise it to people who like to live dangerously. In case you are hiding your files on your PC, we advise using a reputable antivirus software(https://sensorstechforum.com/top-10-free-antivirus-tools-2016-report/) to protect them, the very least.

On Another Logical Drive(Partition) on Your PC

This option also makes sense if the files are not that important for you. It will keep you safe from malware which may corrupt your OS and make you reinstall it. Contudo, its effectiveness is relatively the same as hiding the files on the PC, because physically they are in the same drive. Você pode, Contudo, lock your Partition using your own OS’s protection. For Windows it can happen by following these administrative actions:

1. Right-click on Your Partition and then Choose “Turn On BitLocker”.
2. Marca “Use a Password”, type your password, clique "Próximo" and You are Done.

resumo

The bottom line is that no protection method is 100 percent secure. This is most likely the reason some users chose the “Other” voting option. As vezes, it is good to use a combination of several different data storing methods to increase the security of the files. We have often heard of experts talking about keeping the data in more than one copies on different drives, so that if the files are lost, they have an instant backup. We have also used a USB encryption software which directly locks the USB drive, denying all access to it and encrypts the files in it, gostar APO Encryption Standard for USB, por exemplo. De qualquer jeito, it is important to include the human factor, because it is the most important one. Isso é por que, whichever methods you may choose, we advise you to stay updated on how to protect your information and for the more paranoid users we recommend reading security blocks and asking around in forums. Porque, with today’s ever-changing world the methods of data theft are always changing and with that, also should our behavior towards technology usage in that sense.

Avatar

Ventsislav Krastev

Ventsislav é especialista em segurança cibernética na SensorsTechForum desde 2015. Ele tem pesquisado, cobertura, ajudando vítimas com as mais recentes infecções por malware, além de testar e revisar software e os mais recentes desenvolvimentos tecnológicos. Formado marketing bem, Ventsislav também é apaixonado por aprender novas mudanças e inovações em segurança cibernética que se tornam revolucionárias. Depois de estudar o gerenciamento da cadeia de valor, Administração de rede e administração de computadores de aplicativos do sistema, ele encontrou sua verdadeira vocação no setor de segurança cibernética e acredita firmemente na educação de todos os usuários quanto à segurança e proteção on-line.

mais Posts - Local na rede Internet

Me siga:
Twitter

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

limite de tempo está esgotado. Recarregue CAPTCHA.

Compartilhar no Facebook Compartilhar
Carregando...
Compartilhar no Twitter chilrear
Carregando...
Compartilhar no Google Plus Compartilhar
Carregando...
Partilhar no Linkedin Compartilhar
Carregando...
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Carregando...
Partilhar no StumbleUpon Compartilhar
Carregando...