Your data (and all the data on your network) is just one click away from being locked up by scammers. If you don’t pay them, they will throw away the key.
Building on the MoneyPack malware that has spread in the last couple of years, scammers upped their game with the CryptoLocker malware: it silently encrypts the files on your Windows computer, making them inaccessible. Once the files are encrypted, it pops up a screen telling you the bad news and requesting a ransom for the key. Depending on the variant, it may also encrypt files on your network drives (think, your company’s file server) or folders that sync to the cloud (like DropBox).
If you pay the hundreds of dollars in ransom, they say they’ll decrypt your files, but you have to take the word of a scammer on that. Your best chance of recovering your files is to restore them from a backup. You have backups, right?
The best way to avoid losing data to this new threat sounds like a Best Practices manual for computer usage. Following these suggestions will protect you from CryptoLocker as well as a variety of other nasties. Plus it could help you recover from hardware failures too:
Following the tips above will help you avoid this new strain of malware and recover from it if you (or someone on your network) get infected by it.