{"id":3631,"date":"2017-02-17T12:54:10","date_gmt":"2017-02-17T19:54:10","guid":{"rendered":"http:\/\/abclegaldocs.com\/blog-Colorado-Notary\/?p=3631"},"modified":"2024-07-10T11:23:09","modified_gmt":"2024-07-10T17:23:09","slug":"ransomware-protection-and-removal","status":"publish","type":"post","link":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/","title":{"rendered":"Ransomware Protection and Removal"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#Ransomware_Protection_and_Removal\" >Ransomware Protection and Removal<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#1_Frequent_Automatic_Backups\" >1. Frequent Automatic Backups<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#2_Offline_Backup\" >2. Offline Backup<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#3_Do_Not_Open_Unsolicited_Email_Links_and_Attachments\" >3. Do Not Open Unsolicited Email Links and Attachments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#4_Do_Not_Download_Software_from_Unknown_Sites\" >4. Do Not Download Software from Unknown Sites<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#5_Keep_Software_Updated\" >5. Keep Software Updated<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#6_Keep_Anti-Virus_and_Anti-Malware_Updated\" >6. Keep Anti-Virus and Anti-Malware Updated<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#7_Disable_Macros_in_Microsoft_Office_Files\" >7. Disable Macros in Microsoft Office Files<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#8_Block_Program_Execution_from_Common_Ransomware_Folders\" >8. Block Program Execution from Common Ransomware\u00a0Folders<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#Additional_Ransomware_Considerations_for_Businesses\" >Additional Ransomware Considerations for Businesses<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#9_Security_Training_for_Computer_Users\" >9. Security Training for Computer Users<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#10_Patch_Software_Quickly_to_Remove_Security_Vulnerabilities\" >10. Patch Software Quickly to Remove Security Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#11_Restrict_the_Use_of_Administrative_Accounts\" >11. Restrict the Use of Administrative Accounts<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#12_Restrict_User_Privileges\" >12. Restrict User Privileges<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#13_Use_Virtualized_Environments\" >13. Use Virtualized Environments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#14_Categorize_and_Store_Data_Separately\" >14. Categorize and Store Data Separately<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#15_Require_Passwords_for_Web_Sites\" >15. Require Passwords for Web Sites<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#16_Use_Application_Whitelisting\" >16. Use Application Whitelisting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#Ransomware_Removal\" >Ransomware Removal<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#Other_Ransomware_Protection\" >Other Ransomware Protection<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#About_the_Author\" >About the Author<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h1 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Ransomware_Protection_and_Removal\"><\/span>Ransomware Protection and Removal<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-lock-keyboard-cash.jpg\"><img decoding=\"async\"  class=\"alignleft size-full wp-image-3639\" src=\"data:image\/gif,GIF89a%01%00%01%00%80%00%00%00%00%00%FF%FF%FF%21%F9%04%01%00%00%00%00%2C%00%00%00%00%01%00%01%00%00%02%01D%00%3B\" data-layzr=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-lock-keyboard-cash.jpg\" alt=\"ransomware lock keyboard cash\" width=\"300\" height=\"200\" \/><\/a><strong>Ransomware<\/strong> is a type of <strong>malware<\/strong> that blocks access or holds data files hostage, often using strong <strong>encryption<\/strong>, usually requiring a large ransom payment quickly in <strong>Bitcoin<\/strong> <strong>cryptocurrency<\/strong> to restore access.<\/p>\n<p style=\"text-align: justify;\">Ransomware attacks exploit weaknesses in data protection, and of users who are untrained or <strong>negligent<\/strong>\u00a0in\u00a0<strong>cybersecurity<\/strong> best practices.<\/p>\n<p style=\"text-align: justify;\">Ransomware is a\u00a0serious threat, spreading quickly and getting smarter at evading detection by <strong>anti-virus<\/strong> software and targeting key facilities, servers, users, high-value data files, <strong>databases<\/strong>, and <strong>backup<\/strong> files.<\/p>\n<p style=\"text-align: justify;\">Protect your data and business now by implementing <strong>ransomware protection<\/strong>, detection, and a response plan, to contain, eradicate and recover. Many of the recommendations found here also protect computer systems and data from other types of malware, attacks, user errors, device failures or <strong>disasters<\/strong>.<\/p>\n<p style=\"text-align: justify;\">In September 2016, the <strong>FBI<\/strong> <strong>Internet Crime Complaint Center<\/strong> (IC3) published a <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.ic3.gov\/media\/2016\/160915.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware\u00a0<strong>Public Service Announcement<\/strong><\/a><\/span> (<strong>PSA<\/strong>) urging victims to report ransomware incidents and request assistance immediately from the local FBI field office. The FBI recommends users consider implementing the following ransomware <strong>prevention<\/strong> and <strong>business continuity<\/strong> measures (<em>shown below in italics<\/em>) to reduce the risk of a successful attack.<\/p>\n<p style=\"text-align: justify;\">The FBI does not advocate paying a ransom to an\u00a0adversary. Paying a ransom does not guarantee a victim will regain access to the captive data\u00a0and it provides more funds for criminals to continue their\u00a0malicious activity.<\/p>\n<p style=\"text-align: justify;\"><strong>Note<\/strong>: Some recommendations may require advanced knowledge of a <strong>security consultant<\/strong> or <strong>system administrator<\/strong>. Do not make security or system changes beyond your level of knowledge. Seek help where needed. Create a data backup and a\u00a0<strong>system restore<\/strong>\u00a0<strong>point<\/strong> before installing new software or making system changes.<\/p>\n<p style=\"text-align: justify;\"><!--more--><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"1_Frequent_Automatic_Backups\"><\/span>1. Frequent Automatic Backups<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Regularly back up data and verify the integrity of those backups. Backups are critical in ransomware incidents; if you are infected, backups may be the best way to recover your critical data.<\/em><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/cloud-storage-lock.jpg\"><img decoding=\"async\"  class=\"alignleft size-full wp-image-3642\" src=\"data:image\/gif,GIF89a%01%00%01%00%80%00%00%00%00%00%FF%FF%FF%21%F9%04%01%00%00%00%00%2C%00%00%00%00%01%00%01%00%00%02%01D%00%3B\" data-layzr=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/cloud-storage-lock.jpg\" alt=\"cloud storage lock\" width=\"180\" height=\"180\" \/><\/a>Scheduled automatic\u00a0<strong>data\u00a0backups<\/strong> may be a better choice than continuous <strong>real-time<\/strong> backups to <strong>cloud storage<\/strong>. If the primary data file gets infected, real-time backups will quickly replicate the infection in the backup copy. Then, cloud storage <strong>data synchronization<\/strong> may send the infected files to other synced devices\u00a0and overwrite good data.<\/p>\n<p style=\"text-align: justify;\">Scheduled backups at night, or at key times during the workday, following peak data input, revisions or updates, may be sufficient for many home users and small businesses. If ransomware is detected, the scheduled backups may be stopped, or backup media removed to create an <strong>air gap<\/strong>\u00a0for data protection until the infection is contained and eradicated.<\/p>\n<p style=\"text-align: justify;\">Use backup software that includes <strong>file verification<\/strong> to ensure all files were written correctly. Monitor the <strong>backup log<\/strong> to check for errors during the backup process. Be aware that open files might not be saved. Where appropriate, save and close data files at the end of the workday so the latest version will be stored in nightly backups. Encrypted files may need to be backed up by the file owner, not by a backup program running as a different user.<\/p>\n<p style=\"text-align: justify;\"><strong>WordPress<\/strong> users must backup WordPress files. Free plugins, including <strong>UpDraftPlus<\/strong>, may be used to save <strong>database backup<\/strong> copies to cloud storage.<\/p>\n<p style=\"text-align: justify;\"><strong>Microsoft Outlook<\/strong> includes an <span style=\"text-decoration: underline;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/archiving-email-with-outlook\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>email\u00a0archive<\/strong><\/a><\/span> feature to save email to a local file that can be backed up. Time ranges may be selected to create email archive files covering different time periods.<\/p>\n<p style=\"text-align: justify;\"><span style=\"background-color: #ffff00;\"><strong>Update<\/strong><\/span>: <strong>Acronis True Image<\/strong> 2017 New Generation, with Active Protection for Windows, is available by premium subscription, and includes local and cloud backup with ransomware protection by monitoring the Master Boot Record (MBR), abnormal file behavior, such as bulk file renaming, a whitelist of approved programs, a blacklist of unauthorized programs, program self-defense, and recovery of ransomware encrypted files by restoring good files from backup.<\/p>\n<p style=\"text-align: justify;\">In addition, <strong>Acronis Notary<\/strong> technology uses a file <strong>hash value<\/strong> and <strong>Ethereum<\/strong> <span style=\"text-decoration: underline;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/category\/blockchain\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>blockchain<\/strong><\/a><\/span> technology to generate a unique notary certificate to validate the file retrieved is identical to the file originally backed up.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"2_Offline_Backup\"><\/span>2. Offline Backup<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Secure your backups. Ensure that at least one <span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/offline-backup-data-storage\/\" target=\"_blank\" rel=\"noopener\">offline backup<\/a><\/strong><\/span> copy is not connected (air-gapped) to the computers and networks it is backing up. Examples include securing backups in the cloud storage or physically storing them offline in a fireproof safe. It should be noted, some instances of ransomware have the capability to lock cloud-based backups when systems continuously back up in real-time, also known as persistent synchronization.<\/em><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Kanguru-FlashBlu30-USB-flash-drive.jpg\"><img decoding=\"async\"  class=\"alignleft size-full wp-image-3636\" src=\"data:image\/gif,GIF89a%01%00%01%00%80%00%00%00%00%00%FF%FF%FF%21%F9%04%01%00%00%00%00%2C%00%00%00%00%01%00%01%00%00%02%01D%00%3B\" data-layzr=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Kanguru-FlashBlu30-USB-flash-drive.jpg\" alt=\"Kanguru FlashBlu30 USB flash drive\" width=\"240\" height=\"160\" \/><\/a>Once the backup files are written, the storage media can be set to <strong>read-only<\/strong> for <strong>archiving<\/strong> <strong>fixed-content<\/strong> files, so that the data cannot be modified or deleted. Many permanent files do not need to be modified by the user, only archived for <strong>recordkeeping<\/strong>.<\/p>\n<p style=\"text-align: justify;\">Archives should include a separate\u00a0<strong>manifest<\/strong> of file <strong>hash values<\/strong> used for\u00a0periodic\u00a0testing of <strong>file integrity<\/strong>, such as once a month, or quarter, to confirm file count and content <strong>fixity<\/strong> (see <span style=\"text-decoration: underline;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/exactfile-file-verification-for-backups-archives\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>ExactFile<\/strong><strong>\u00a0software<\/strong><\/a><\/span>).\u00a0<strong>File Integrity Monitoring<\/strong> (FIM) helps identify when data is changed or manipulated. Computed hash values,\u00a0such as <strong>SHA-256<\/strong> (Secure Hash Algorithm 256-bit), change dramatically, even if only\u00a0a single character is changed in a file, making alteration easier to detect.<\/p>\n<p style=\"text-align: justify;\">Even without malicious or accidental changes, magnetic, optical\u00a0and flash memory storage media is affected by damage, degradation and <strong>bit rot<\/strong> over time. If one copy becomes defective, another known good copy may be used to restore data.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Lexar-USB-flash-drive-P20-128GB.jpg\"><img decoding=\"async\"  class=\"alignleft size-full wp-image-3650\" src=\"data:image\/gif,GIF89a%01%00%01%00%80%00%00%00%00%00%FF%FF%FF%21%F9%04%01%00%00%00%00%2C%00%00%00%00%01%00%01%00%00%02%01D%00%3B\" data-layzr=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Lexar-USB-flash-drive-P20-128GB.jpg\" alt=\"Lexar USB flash drive P20 128GB\" width=\"200\" height=\"150\" \/><\/a>Some media choices for archival <strong>read-only<\/strong> storage are <strong>USB flash drives<\/strong> with a <strong>write-protect<\/strong> switch, (<strong>Kanguru FlashBlu30<\/strong>, up to 256 GB), Verbatim archival grade <strong>DVD<\/strong> (8.5 GB) or 4-layer <strong>Blu-ray<\/strong> discs (128 GB), and archival <strong>M-discs<\/strong> that can engrave up to 100 GB on BDXL.<\/p>\n<p style=\"text-align: justify;\">Cloud storage must include <strong>versioning<\/strong>, so older versions of files are stored, not overwritten, and not deleted automatically. <span style=\"background-color: #ffff00;\"><strong>Caution<\/strong><\/span>: Some vendors delete files older than 30, 60 or 90 days.<\/p>\n<p style=\"text-align: justify;\"><strong>Encryption<\/strong> should be used to protect confidential files. Some USB flash drives, including the fast <strong>Lexar JumpDrive P20<\/strong> (up to 128 GB), are bundled with AES 256-bit encryption software included. Unauthorized users cannot access the encrypted container on the flash drive without the password. Brute\u00a0force password guessing is throttled.<\/p>\n<p style=\"text-align: justify;\">For compact, rugged storage, mini flash drives include the <span style=\"text-decoration: underline;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/samsung-usb-3-0-mini-flash-drive-fit-128gb\/\" target=\"_blank\" rel=\"noopener noreferrer\">Samsung 128 GB USB flash drive FIT<\/a><\/span>. \u00a0<span style=\"text-decoration: underline;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/backup-files-to-micro-sd-memory-card\/\" target=\"_blank\" rel=\"noopener noreferrer\">Micro SD flash memory cards<\/a><\/span>\u00a0are also available up to 200 GB.<\/p>\n<h2 style=\"text-align: justify;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/phishing.jpg\"><img decoding=\"async\"  class=\"alignleft size-full wp-image-3643\" src=\"data:image\/gif,GIF89a%01%00%01%00%80%00%00%00%00%00%FF%FF%FF%21%F9%04%01%00%00%00%00%2C%00%00%00%00%01%00%01%00%00%02%01D%00%3B\" data-layzr=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/phishing.jpg\" alt=\"phishing\" width=\"220\" height=\"160\" \/><\/a>3. Do Not Open Unsolicited Email Links and Attachments<\/h2>\n<p style=\"text-align: justify;\"><em>Scrutinize links contained in emails and do not open attachments included in unsolicited e-mails.<\/em><\/p>\n<p style=\"text-align: justify;\">Beware of fake, spoof, malware, <strong>phishing<\/strong> and targeted\u00a0spearphishing\u00a0in an unsolicited email. Hold the mouse pointer over the web link embedded in the email to reveal the target website address. Do not click on an unknown link or a shortened link.<\/p>\n<p style=\"text-align: justify;\">Do not open email attachments in an unsolicited email. Files that appear to be <strong>PDF<\/strong>\u00a0or document files may be executable malware files.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"4_Do_Not_Download_Software_from_Unknown_Sites\"><\/span>4. Do Not Download Software from Unknown Sites<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Only download software \u2013 especially free software \u2013 from sites you know and trust. When possible, verify the integrity of the software through a digital signature prior to execution.<\/em><\/p>\n<p style=\"text-align: justify;\">Before executing any new <strong>software download<\/strong>, scan it with <strong>anti-virus<\/strong> and <strong>anti-malware<\/strong> software. Check the file with <strong>VirusTotal.com<\/strong> to see if problems are reported by any other antivirus software. To verify file integrity, if the file is accompanied by a <strong>hash value<\/strong>, use <strong>hash generator<\/strong> software to compute the hash value on the downloaded file and compare it to the posted hash value at the source.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"5_Keep_Software_Updated\"><\/span>5. Keep Software Updated<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Ensure application patches, for the operating system, software, and firmware,\u00a0<\/em>are<em> up to date, including Adobe Flash, Java, Web browsers, etc.<\/em><\/p>\n<p style=\"text-align: justify;\">Set the operating system and application software to do <strong>automatic updates<\/strong>, when available. Many free applications must be updated manually. Free utilities are available to monitor software revisions and <strong>alert<\/strong> the user when a new version is available.<\/p>\n<p style=\"text-align: justify;\">Always use the latest version <strong>web browser<\/strong> to include the latest security patches.<\/p>\n<p style=\"text-align: justify;\"><strong>WordPress<\/strong> users should promptly update to new versions of WordPress and <strong>plugins<\/strong>. Avoid plugins that have not been updated in many months or that are no longer supported.<\/p>\n<p style=\"text-align: justify;\"><strong>Hackers<\/strong> study new software releases to learn the <strong>weakness<\/strong> that is being secured. Then they can attack current users who are vulnerable because they are negligent and still running the old insecure version.<\/p>\n<p style=\"text-align: justify;\">Install the latest firmware version on mobile devices including <strong>smartphones<\/strong>.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"6_Keep_Anti-Virus_and_Anti-Malware_Updated\"><\/span>6. Keep Anti-Virus and Anti-Malware Updated<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Ensure anti-virus and anti-malware solutions are set to automatically update and regular scans are conducted.<\/em><\/p>\n<p style=\"text-align: justify;\">Install highly rated premium <strong>internet security suite<\/strong> software, including anti-virus, with frequent <strong>automatic updates<\/strong> throughout the day to include detection of the latest threats. Relying only on threat <strong>signature detection<\/strong> is not\u00a0adequate because\u00a0sophisticated malware is learning\u00a0how to avoid signature detection.<\/p>\n<p style=\"text-align: justify;\">Behavioral, heuristic or <strong>anomaly detection<\/strong> is needed to discover abnormal behavior.<\/p>\n<p style=\"text-align: justify;\">Internet security suite software includes anti-virus, email virus detection, spam, and phishing blocking, anti-spyware, and <strong>web access protection<\/strong> from malicious or compromised websites. Some second-opinion anti-malware software is available that is compatible with anti-virus software.<\/p>\n<p style=\"text-align: justify;\"><strong><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-notice.jpg\"><img decoding=\"async\"  class=\"alignleft size-full wp-image-3645\" src=\"data:image\/gif,GIF89a%01%00%01%00%80%00%00%00%00%00%FF%FF%FF%21%F9%04%01%00%00%00%00%2C%00%00%00%00%01%00%01%00%00%02%01D%00%3B\" data-layzr=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-notice.jpg\" alt=\"ransomware notice\" width=\"240\" height=\"160\" \/><\/a>Anti-ransomware<\/strong> is a new feature and may not be included. Check the feature description of your security software. Upgrade software when needed for stronger protection.<\/p>\n<p style=\"text-align: justify;\"><strong>Malwarebytes<\/strong> is popular second-opinion <strong>anti-malware<\/strong> software that can co-reside with anti-virus software. The free version only runs manually on demand. The <strong>premium version<\/strong> runs in real time and includes <strong>anti-ransomware<\/strong> software, based on <strong>CryptoMonitor<\/strong>, that was acquired by Malwarebytes. It uses proactive technology, not signatures or heuristics, to stop ransomware before it <strong>encrypts<\/strong> your files.<\/p>\n<p style=\"text-align: justify;\"><span style=\"background-color: #ffff00;\"><strong>Update<\/strong><\/span>: <strong>IObit Malware Fighter 5<\/strong> now includes an <strong>anti-ransomware<\/strong> engine. You can specify which data file extension types to protect, add approved programs to a whitelist, block unapproved programs on a blacklist, and see access history for protected files.<\/p>\n<p style=\"text-align: justify;\"><span style=\"background-color: #ffff00;\"><strong>Update<\/strong><\/span>: <strong>Cybereason<\/strong>, a cybersecurity company, has released free software named <strong>RansomFree<\/strong>, a behavioral anti-ransomware tool for detecting and stopping never-before-seen ransomware.<\/p>\n<p style=\"text-align: justify;\">Run scans on a frequent, <strong>automatic schedule<\/strong> to detect problems quickly. Enable <strong>idle-state scanning<\/strong> to run scans when you are away from the computer and logged off, or the computer is locked or in screen-saver mode.<\/p>\n<p style=\"text-align: justify;\">Install security suite software on smartphones.<\/p>\n<p style=\"text-align: justify;\"><strong>Caution<\/strong>: Do not rely on antivirus and antimalware protection software alone. Users must be trained to follow <strong>cybersecurity<\/strong> best practices to keep out malware and ransomware.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"7_Disable_Macros_in_Microsoft_Office_Files\"><\/span>7. Disable Macros in Microsoft Office Files<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Disable macro scripts from files transmitted via e-mail. Consider using Office Viewer software to open Microsoft Office files transmitted via e-mail instead of full Office Suite applications.<\/em><\/p>\n<p style=\"text-align: justify;\">Block and do not open <strong>.docm<\/strong> files containing <strong>macro<\/strong> scripts.<\/p>\n<p style=\"text-align: justify;\"><strong>Office 2016<\/strong> now includes (added March 2016) control to <em>Block macros from running in Office files from the internet<\/em>.<br \/>\nFor <strong>Office 2013<\/strong>, install the\u00a0Group Policy Administrative Template (ADMX\/ADML) and Office Customization Tool (OPAX\/OPAL) files (added October 2016).<\/p>\n<p style=\"text-align: justify;\">Or, use a separate <strong>Office Viewer<\/strong> application with no macro support or macros disabled.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"8_Block_Program_Execution_from_Common_Ransomware_Folders\"><\/span>8. Block Program Execution from Common Ransomware\u00a0Folders<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Implement software restrictions or other controls to prevent the execution of programs in common ransomware locations, such as temporary folders supporting popular Internet browsers, or compression\/decompression programs, including those located in the AppData\/LocalAppData folder.<\/em><\/p>\n<p style=\"text-align: justify;\">Create <strong>rules<\/strong> within <strong>Windows<\/strong> or with <strong>Intrusion Prevention Software<\/strong> (<strong>IPS<\/strong>). Programs should be allowed to run only from the usual <strong>Program Files folder<\/strong> where new programs cannot be installed without administrative privileges.<\/p>\n<p style=\"text-align: justify;\">A management tool consists of the <strong>Software Restriction Policies<\/strong> (<strong>SRP<\/strong>) extension of the <strong>Group Policy Object<\/strong> (<strong>GPO<\/strong>) Editor snap-in, that administrators use to create and edit software restriction policies.<\/p>\n<p style=\"text-align: justify;\"><strong>CryptoPrevent<\/strong> is a security tool that writes group policy object (GPO) restriction rules into the <strong>registry<\/strong> to prevent executable files in specific locations from running. Backup the registry before editing.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Additional_Ransomware_Considerations_for_Businesses\"><\/span>Additional Ransomware Considerations for Businesses<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">After the first 8 recommendations above, consider implementing these additional recommendations where appropriate. Some may not apply to home users and small businesses.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"9_Security_Training_for_Computer_Users\"><\/span>9. Security Training for Computer Users<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/hacker-keyboard-global-map.jpg\"><img decoding=\"async\"  class=\"alignleft size-full wp-image-3646\" src=\"data:image\/gif,GIF89a%01%00%01%00%80%00%00%00%00%00%FF%FF%FF%21%F9%04%01%00%00%00%00%2C%00%00%00%00%01%00%01%00%00%02%01D%00%3B\" data-layzr=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/hacker-keyboard-global-map.jpg\" alt=\"hacker keyboard global map\" width=\"240\" height=\"120\" \/><\/a><em>Focus on awareness and training. Because end users are often targeted, employees should be made aware of the threat of ransomware, how it is delivered, and trained on information security principles and techniques.<\/em><\/p>\n<p style=\"text-align: justify;\">Attend webinars and <strong>training<\/strong> classes on <strong>computer security<\/strong>. Read about security. Follow cybersecurity news, blogs, social media, and alerts.<\/p>\n<p style=\"text-align: justify;\">Create a business <strong>Written Information Security Policy<\/strong> (<strong>WISP<\/strong>) and have all employees read and follow it. \u00a0Designate a <strong>security officer<\/strong> as the key contact person.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"10_Patch_Software_Quickly_to_Remove_Security_Vulnerabilities\"><\/span>10. Patch Software Quickly to Remove Security Vulnerabilities<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Patch all endpoint device operating systems, software, and firmware as vulnerabilities are discovered. This precaution can be made easier through a centralized patch management system.<\/em><\/p>\n<p style=\"text-align: justify;\">Patch software quickly on all user systems when vulnerabilities are found. Larger enterprise businesses may use a <strong>centralized patch management<\/strong> system to keep all network devices updated.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"11_Restrict_the_Use_of_Administrative_Accounts\"><\/span>11. Restrict the Use of Administrative Accounts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Manage the use of privileged accounts by implementing the principle of least privilege. No users should be assigned administrative access unless absolutely needed. Those with a need for administrator accounts should only use them when necessary; they should operate with standard user accounts at all other times.<\/em><\/p>\n<p style=\"text-align: justify;\">Only the\u00a0<strong>system administrator<\/strong> should use an account with <strong>administrative privileges<\/strong>. All other users must use a <span style=\"text-decoration: underline;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/standard-user-account-administrator\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>standard user account<\/strong><\/a><\/span> with <strong>limited privileges<\/strong> to prevent an <strong>intruder<\/strong> from gaining access or control to restricted content or authority. The administrator must use a standard user account when not performing administrative duties. Use <span style=\"text-decoration: underline;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/yubikey-computer-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>two-factor authentication<\/strong><\/a><\/span>\u00a0(2FA) where available.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"12_Restrict_User_Privileges\"><\/span>12. Restrict User Privileges<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Configure access controls with least privilege in mind. If a user only needs to read specific files, he or she should not have write access to those files, directories, or shares.<\/em><\/p>\n<p style=\"text-align: justify;\">Do not give users unneeded\u00a0<strong>privileges<\/strong> to allow Full Control, Modify, Read &amp; Execute, Read, and Write for files and folders if lesser privileges like <strong>read-only<\/strong>\u00a0are sufficient. Data lookup and reference files may be stored in a <strong>read-only<\/strong> folder or volume.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"13_Use_Virtualized_Environments\"><\/span>13. Use Virtualized Environments<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Use virtualized environments to execute operating system environments or specific programs.<\/em><\/p>\n<p style=\"text-align: justify;\">Install software to create <strong>virtual machines<\/strong> (VM) in virtualized environments, providing partitions and layers of protection.\u00a0Intrusion detection\u00a0tools are available, an infection may be isolated, disaster recovery is quick, and\u00a0forensic analysis tools including <strong>snapshots<\/strong> are available to study the intrusion.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"14_Categorize_and_Store_Data_Separately\"><\/span>14. Categorize and Store Data Separately<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Categorize data based on organizational value, and implement physical\/logical separation of networks and data for different organizational units. For example, sensitive research or business data should not reside on the same server and\/or network segment as an organization\u2019s e-mail environment.<\/em><\/p>\n<p style=\"text-align: justify;\">Different users and departments need access to different network segments and\u00a0<strong>categories<\/strong> of data, not all of the network or data. <strong>Critical\u00a0data<\/strong> may be stored on a highly secure <strong>network<\/strong> or on a restricted\u00a0<span style=\"text-decoration: underline;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/air-gap-computer-network-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>air gap system<\/strong><\/a><\/span> with no network connection. Intrusions will be limited to affecting only some data categories or users on one network segment.<\/p>\n<p style=\"text-align: justify;\">Backup copies may be stored <strong>offline<\/strong> in a <strong>fireproof safe<\/strong> or at a secure <strong>offsite<\/strong>\u00a0or <strong>disaster recovery<\/strong>\u00a0(DR) location.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"15_Require_Passwords_for_Web_Sites\"><\/span>15. Require Passwords for Web Sites<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Require user interaction for end-user applications communicating with Web sites uncategorized by the network proxy or firewall. Examples include requiring users to type in information or enter a password when the system communicates with an uncategorized Web site.<\/em><\/p>\n<p style=\"text-align: justify;\"><strong>Firewalls<\/strong> can use rules to block unauthorized access. Applications communicating with new websites that may not be categorized should require a user <strong>password<\/strong> or other authentication.<\/p>\n<p style=\"text-align: justify;\">Secure <strong>SSL<\/strong> connections should be used. Users should not use mobile devices on\u00a0<strong>public Wi-Fi<\/strong> hotspots without security suite software and an approved <span style=\"text-decoration: underline;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/virtual-private-network-vpn-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>virtual private network<\/strong> (<strong>VPN<\/strong>)<\/a><\/span>.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"16_Use_Application_Whitelisting\"><\/span>16. Use Application Whitelisting<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><em>Implement application whitelisting. Only allow systems to execute programs known and permitted by the <\/em>security<em> policy.<\/em><\/p>\n<p style=\"text-align: justify;\"><strong>Application whitelisting<\/strong> is intended to stop the\u00a0execution of malware and other unauthorized software. Unlike security such as anti-virus\u00a0software, which use <strong>blacklists<\/strong> to <strong>block<\/strong> <strong>known bad<\/strong> activity and permit all other activity, application <strong>whitelists<\/strong>\u00a0are designed to <strong>permit<\/strong> <strong>known good<\/strong> activity and block all other activity.<\/p>\n<p style=\"text-align: justify;\">Consider using application whitelisting technologies already built into the <strong>operating system<\/strong>,\u00a0at least in a monitoring mode. Use the <strong>Security Policy Editor<\/strong> to configure the Software Restriction Policies category, under Local Security Policies, for a\u00a0machine. Or, use the <strong>Group Policy Editor<\/strong> to configure a domain.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Ransomware_Removal\"><\/span>Ransomware Removal<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">Expect that some ransomware may not be detected until after your data has been encrypted and a <strong>ransom note<\/strong> appears. Disconnect the infected devices from the network. Do not delete any files. Turn off system cleaner software. Ransomware traces are often found in temporary files and folders, needed to diagnose the problem. Do not delete any files moved to quarantine by security software.<\/p>\n<p style=\"text-align: justify;\">Report the incident to the local FBI field office.\u00a0Get cybersecurity or data recovery help as needed from a reputable provider.<\/p>\n<p style=\"text-align: justify;\">Make an image or backup copy of the infected drive and save it before attempting data recovery. This will allow multiple attempts at data recovery if decryption fails.<\/p>\n<p style=\"text-align: justify;\">Scan the malware program at <strong>VirusTotal.com<\/strong> or upload a small non-confidential encrypted file or ransom note file at\u00a0<strong>ID-Ransomware<\/strong> at <strong>Malwarehunters.com<\/strong> to identify the strain and find out if a decrypter tool is available. Then follow the instructions for the decrypter tool. There is no guarantee that the decrypter you require will be available or that it will work. Remove the malware before decrypting or it may encrypt your files again.<\/p>\n<p style=\"text-align: justify;\">If the ransomware cannot be removed, remove the infected drive. It may be repairable later when new software becomes available. For a system drive, replace it with a pre-infection clone backup. Otherwise, install a new drive and reinstall the operating system and applications.<\/p>\n<p style=\"text-align: justify;\">For a data drive, replace it with a new drive and restore data files from a known good backup. Be careful not to infect backup media with ransomware. That is why read-only media is recommended for restoring files.<\/p>\n<p style=\"text-align: justify;\">As a precaution, change passwords on all user accounts. Make sure the ransomware did not create a new user account or administrator account.<\/p>\n<p style=\"text-align: justify;\">Strengthen security to prevent the same type of attack from happening again. \u00a0Follow the news for the strain to learn if a decrypter becomes available.<\/p>\n<p style=\"text-align: justify;\">As anti-ransomware software improves, it will be able to detect and remove more ransomware variants.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Other_Ransomware_Protection\"><\/span>Other Ransomware Protection<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/back-it-up_backup.jpg\"><img decoding=\"async\"  class=\"alignleft size-full wp-image-3644\" src=\"data:image\/gif,GIF89a%01%00%01%00%80%00%00%00%00%00%FF%FF%FF%21%F9%04%01%00%00%00%00%2C%00%00%00%00%01%00%01%00%00%02%01D%00%3B\" data-layzr=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/back-it-up_backup.jpg\" alt=\"back it up backup\" width=\"150\" height=\"100\" \/><\/a>The list above is based on the FBI public service recommendations, with commentary added. Add other ransomware protection suitable for your situation and budget.<\/p>\n<p style=\"text-align: justify;\">Home users and small office\/home office (<strong>SOHO<\/strong>) businesses can build a strong defense by following <strong>cybersecurity<\/strong> <strong>best practices<\/strong> and some investment in <strong>hardware<\/strong> and <strong>software<\/strong>. Building a malware defense and recovery plan\u00a0is much less expensive and less stressful than paying a ransom or\u00a0facing permanent data loss of business files, personal records, or irreplaceable <strong>family photos<\/strong> and <strong>videos<\/strong>. Many businesses never recover from a disaster, including a <span style=\"text-decoration: underline;\"><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/data-security-breach-notice\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>data breach<\/strong><\/a><\/span> or data loss.<\/p>\n<p style=\"text-align: justify;\">Larger enterprise businesses with a bigger budget can also hire a security consultant and use a system administrator to install more sophisticated defenses.<\/p>\n<p style=\"text-align: justify;\">Other final tips:<\/p>\n<p style=\"text-align: justify;\">Upgrade from stand-alone antivirus software to Internet security suite software for broader protection.<br \/>\nScan files with security software before making a backup copy to prevent copying infected files.<br \/>\nUse a <strong>pop-up blocker<\/strong> on your web browser.<br \/>\nUse an <strong>ad blocker<\/strong>\u00a0on your web browser to block <strong>malvertising<\/strong>.<br \/>\nIn email settings, block automatic picture downloads from the Internet.<br \/>\nSet up an interactive <strong>firewall<\/strong> to approve or block outside communications.<br \/>\nDisable Flash, Flash Player, and JavaScript.<br \/>\nTurn off remote access capability and Remote Desktop Protocol (RDP).<br \/>\nEnable the \u2018Show file extensions\u2019 option in Windows to spot potentially malicious files. Stay away from file extensions like .exe, .vbs and .scr.<br \/>\nStore all confidential files using <strong>military-grade<\/strong>\u00a0<strong>256-bit AES encryption<\/strong>.<br \/>\n<strong>VeraCrypt<\/strong> is free encryption software, based on\u00a0<strong>TrueCrypt<\/strong> and improved.<br \/>\nKeep at least one backup computer disconnected from the network.<br \/>\nSplit computers and devices into separate networks.<br \/>\nCreate separate <strong>drive partitions<\/strong> on your primary hard disk or SSD for programs, data and media files.<br \/>\nUse <strong>cloning software<\/strong> to make a clone copy of your system hard disk or SSD periodically.<br \/>\nSmall businesses should follow federal <span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/cybersecurity-standards-nist-ir-7621\/\" target=\"_blank\" rel=\"noopener noreferrer\">cybersecurity standard NIST IR 7621<\/a><\/strong><\/span>.<br \/>\nUse long, strong unique passwords to block brute force login attempts.<br \/>\nLog off when away from your computer.<br \/>\n<span style=\"background-color: #ffff00;\"><br \/>\n<strong>Action Item<\/strong><\/span>: start or improve your <strong>ransomware protection plan<\/strong>. Keep several <strong>read-only<\/strong> data backup copies offline to restore files, after the ransomware is detected and removed.<\/p>\n<p style=\"text-align: justify;\"><strong>Disclaimer<\/strong>: <em>Following the recommendations in this article does not guarantee protection from all ransomware or other malware. Follow cybersecurity best practices to minimize lost time, resources, revenue, customers and business reputation damage. Products or services mentioned are not endorsements. Conduct due diligence before purchase.<\/em><\/p>\n<p style=\"text-align: justify;\">Image credits: 1,2,5,6,7,8 images from government websites, in the public domain. 3,4 manufacturer product photos, Fair Use for commentary and public education, no affiliation.<\/p>\n<h3 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"About_the_Author\"><\/span>About the Author<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.linkedin.com\/in\/jerrylucas123\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Jerry Lucas<\/strong><\/a><\/span> is a retired Principal Computer Hardware Design Engineer, formerly employed with computer manufacturer Digital Equipment Corporation (DEC) for over 20 years. He is currently CEO and training instructor at ABC Legal Docs, LLC, <strong><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/mobile-notary\/\" target=\"_blank\" rel=\"noopener noreferrer\">mobile notary public Colorado Springs<\/a><\/strong> and <strong><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/colorado-notary-training\/\" target=\"_blank\" rel=\"noopener noreferrer\">Colorado Notary Training<\/a><\/strong>. He writes educational blog posts in the <strong><a href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/colorado-notary-blog-posts\/\" target=\"_blank\" rel=\"noopener noreferrer\">Colorado Notary Blog<\/a><\/strong> in several categories, including\u00a0technology, security, product reviews, small business, blogging, notary and legal topics, and notary history.<\/p>\n<p style=\"text-align: justify;\">\u00a9 Copyright 2017\u00a0 ABC Legal Docs, LLC\u00a0 All rights reserved.\u00a0 Do not copy.\u00a0 Citations welcome.\u00a0 Terms of Use apply.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware Protection and Removal Ransomware is a type of malware that blocks access or holds data files hostage, often using strong encryption, usually requiring a large ransom payment quickly in Bitcoin cryptocurrency to restore access. Ransomware attacks exploit weaknesses in data protection, and of users who are untrained or negligent\u00a0in\u00a0cybersecurity best practices. Ransomware is a\u00a0serious threat, spreading quickly and getting smarter at evading detection by anti-virus software and targeting key facilities, servers, users, high-value data files, databases, and backup files. Protect your data and business now by implementing ransomware protection, detection, and a response plan, to contain, eradicate and recover. <\/p>\n","protected":false},"author":1,"featured_media":3639,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2774,1095,921,919],"tags":[2264,2267,895,648,690,2260,374,2254,2269,155,2255,2271,931,1640,684,367,2787,935,2257,668,858,2061,2270,2263,581,2262,5,577,2259,572,2272,2253,2261,2268,2266,2256,687,1804,2265,1047,723,2258],"class_list":["post-3631","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","category-security","category-small-business-tips","category-tech-tips","tag-2fa","tag-acronis","tag-air-gap","tag-anti-virus","tag-archive","tag-attachment","tag-backup","tag-bitcoin","tag-blockchain","tag-cloud-storage","tag-cyber-security","tag-cybereason","tag-cybersecurity","tag-data-breach","tag-email","tag-encryption","tag-ethereum","tag-fbi","tag-file-integrity","tag-firewall","tag-flash-drive","tag-hash-value","tag-iobit-malware-fighter","tag-macros","tag-malware","tag-malwarebytes","tag-notary","tag-password","tag-phishing","tag-privileges","tag-ransomfree","tag-ransomware","tag-software-updates","tag-true-image","tag-veracrypt","tag-versioning","tag-vpn","tag-web-browser","tag-whitelist","tag-wisp","tag-wordpress","tag-write-protect","has_thumb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Protection and Removal - Notary Colorado Springs<\/title>\n<meta name=\"description\" content=\"ransomware,malware, protection,removal,encryption,anti-virus,backup,cloud storage, phishing, attachment, MalwareBytes, firewall, password, Bitcoin, VeraCrypt, 2FA\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Protection and Removal - Notary Colorado Springs\" \/>\n<meta property=\"og:description\" content=\"ransomware,malware, protection,removal,encryption,anti-virus,backup,cloud storage, phishing, attachment, MalwareBytes, firewall, password, Bitcoin, VeraCrypt, 2FA\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/\" \/>\n<meta property=\"og:site_name\" content=\"Notary Colorado Springs\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-17T19:54:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-10T17:23:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-lock-keyboard-cash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jerry Lucas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jerry Lucas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"SocialMediaPosting\"],\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/\"},\"author\":{\"name\":\"Jerry Lucas\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#\\\/schema\\\/person\\\/cd4c4935b559b6653ba24a32dd09116d\"},\"headline\":\"Ransomware Protection and Removal\",\"datePublished\":\"2017-02-17T19:54:10+00:00\",\"dateModified\":\"2024-07-10T17:23:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/\"},\"wordCount\":3481,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/ransomware-lock-keyboard-cash.jpg\",\"keywords\":[\"2FA\",\"Acronis\",\"air gap\",\"anti virus\",\"archive\",\"attachment\",\"backup\",\"Bitcoin\",\"blockchain\",\"cloud storage\",\"cyber security\",\"Cybereason\",\"cybersecurity\",\"data breach\",\"email\",\"encryption\",\"Ethereum\",\"FBI\",\"file integrity\",\"firewall\",\"flash drive\",\"hash value\",\"IObit Malware Fighter\",\"macros\",\"malware\",\"MalwareBytes\",\"notary\",\"password\",\"phishing\",\"privileges\",\"RansomFree\",\"ransomware\",\"software updates\",\"True Image\",\"VeraCrypt\",\"versioning\",\"VPN\",\"web browser\",\"whitelist\",\"WISP\",\"WordPress\",\"write protect\"],\"articleSection\":[\"Blockchain\",\"Security\",\"Small Business Tips\",\"Tech Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/\",\"url\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/\",\"name\":\"Ransomware Protection and Removal - Notary Colorado Springs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/ransomware-lock-keyboard-cash.jpg\",\"datePublished\":\"2017-02-17T19:54:10+00:00\",\"dateModified\":\"2024-07-10T17:23:09+00:00\",\"description\":\"ransomware,malware, protection,removal,encryption,anti-virus,backup,cloud storage, phishing, attachment, MalwareBytes, firewall, password, Bitcoin, VeraCrypt, 2FA\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/ransomware-lock-keyboard-cash.jpg\",\"contentUrl\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/ransomware-lock-keyboard-cash.jpg\",\"width\":300,\"height\":200,\"caption\":\"ransomware lock keyboard cash\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/ransomware-protection-and-removal\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Protection and Removal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#website\",\"url\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/\",\"name\":\"Notary Colorado Springs\",\"description\":\"Mobile Notary Colorado Springs, Colorado Notary Training\",\"publisher\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#organization\",\"name\":\"ABC Legal Docs, LLC\",\"url\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/ABC_logo_200x200.jpg\",\"contentUrl\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/ABC_logo_200x200.jpg\",\"width\":200,\"height\":200,\"caption\":\"ABC Legal Docs, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jerrylucas123\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#\\\/schema\\\/person\\\/cd4c4935b559b6653ba24a32dd09116d\",\"name\":\"Jerry Lucas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g\",\"caption\":\"Jerry Lucas\"},\"description\":\"Author Summary: Jerry Lucas is a retired Colorado Notary Public and notary blogger.Author Portfolio: Jerry has written over 300 articles sharing his subject matter expertise in the Colorado Notary Blog.\",\"sameAs\":[\"https:\\\/\\\/abclegaldocs.com\"],\"url\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/author\\\/notary809\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Protection and Removal - Notary Colorado Springs","description":"ransomware,malware, protection,removal,encryption,anti-virus,backup,cloud storage, phishing, attachment, MalwareBytes, firewall, password, Bitcoin, VeraCrypt, 2FA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Protection and Removal - Notary Colorado Springs","og_description":"ransomware,malware, protection,removal,encryption,anti-virus,backup,cloud storage, phishing, attachment, MalwareBytes, firewall, password, Bitcoin, VeraCrypt, 2FA","og_url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/","og_site_name":"Notary Colorado Springs","article_published_time":"2017-02-17T19:54:10+00:00","article_modified_time":"2024-07-10T17:23:09+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-lock-keyboard-cash.jpg","type":"image\/jpeg"}],"author":"Jerry Lucas","twitter_misc":{"Written by":"Jerry Lucas","Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","SocialMediaPosting"],"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#article","isPartOf":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/"},"author":{"name":"Jerry Lucas","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#\/schema\/person\/cd4c4935b559b6653ba24a32dd09116d"},"headline":"Ransomware Protection and Removal","datePublished":"2017-02-17T19:54:10+00:00","dateModified":"2024-07-10T17:23:09+00:00","mainEntityOfPage":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/"},"wordCount":3481,"commentCount":0,"publisher":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#organization"},"image":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#primaryimage"},"thumbnailUrl":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-lock-keyboard-cash.jpg","keywords":["2FA","Acronis","air gap","anti virus","archive","attachment","backup","Bitcoin","blockchain","cloud storage","cyber security","Cybereason","cybersecurity","data breach","email","encryption","Ethereum","FBI","file integrity","firewall","flash drive","hash value","IObit Malware Fighter","macros","malware","MalwareBytes","notary","password","phishing","privileges","RansomFree","ransomware","software updates","True Image","VeraCrypt","versioning","VPN","web browser","whitelist","WISP","WordPress","write protect"],"articleSection":["Blockchain","Security","Small Business Tips","Tech Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/","url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/","name":"Ransomware Protection and Removal - Notary Colorado Springs","isPartOf":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#primaryimage"},"image":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#primaryimage"},"thumbnailUrl":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-lock-keyboard-cash.jpg","datePublished":"2017-02-17T19:54:10+00:00","dateModified":"2024-07-10T17:23:09+00:00","description":"ransomware,malware, protection,removal,encryption,anti-virus,backup,cloud storage, phishing, attachment, MalwareBytes, firewall, password, Bitcoin, VeraCrypt, 2FA","breadcrumb":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#primaryimage","url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-lock-keyboard-cash.jpg","contentUrl":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-lock-keyboard-cash.jpg","width":300,"height":200,"caption":"ransomware lock keyboard cash"},{"@type":"BreadcrumbList","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/"},{"@type":"ListItem","position":2,"name":"Ransomware Protection and Removal"}]},{"@type":"WebSite","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#website","url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/","name":"Notary Colorado Springs","description":"Mobile Notary Colorado Springs, Colorado Notary Training","publisher":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#organization","name":"ABC Legal Docs, LLC","url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#\/schema\/logo\/image\/","url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ABC_logo_200x200.jpg","contentUrl":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ABC_logo_200x200.jpg","width":200,"height":200,"caption":"ABC Legal Docs, LLC"},"image":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/in\/jerrylucas123"]},{"@type":"Person","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#\/schema\/person\/cd4c4935b559b6653ba24a32dd09116d","name":"Jerry Lucas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g","caption":"Jerry Lucas"},"description":"Author Summary: Jerry Lucas is a retired Colorado Notary Public and notary blogger.Author Portfolio: Jerry has written over 300 articles sharing his subject matter expertise in the Colorado Notary Blog.","sameAs":["https:\/\/abclegaldocs.com"],"url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/author\/notary809\/"}]}},"jetpack_featured_media_url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-lock-keyboard-cash.jpg","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":607,"url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/cybersecurity-standards-nist-ir-7621\/","url_meta":{"origin":3631,"position":0},"title":"Cybersecurity Standards for Small Business, NIST IR 7621","author":"Jerry Lucas","date":"January 14, 2015","format":false,"excerpt":"Cybersecurity Standards for Small Business, NIST IR 7621 Small businesses should follow the information security (cybersecurity) standards published by the National Institute of Standards and Technology (NIST\u00ae), in Interagency Report 7621 (NIST IR 7621). The document may be used to develop a business Written Information Security Policy (WISP). NIST is\u2026","rel":"","context":"In &quot;Federal Law&quot;","block_context":{"text":"Federal Law","link":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/category\/federal-law\/"},"img":{"alt_text":"Cybersecurity Standards for Small Business","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Cybersecurity-Standards-for-Small-Business-320x200.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1674,"url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/","url_meta":{"origin":3631,"position":1},"title":"Affidavit of Cybersecurity Compliance","author":"Jerry Lucas","date":"October 21, 2015","format":false,"excerpt":"Affidavit of Cybersecurity Compliance Small business owners must protect their computer systems and confidential information from destruction, tampering, loss and theft.\u00a0 The National Institute of Standards and Technology (NIST) has written interagency report, NIST IR 7621, on cybersecurity standards for small business.\u00a0 The standard is promoted in partnership with the\u2026","rel":"","context":"In &quot;Federal Law&quot;","block_context":{"text":"Federal Law","link":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/category\/federal-law\/"},"img":{"alt_text":"Tech Tips","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Tech_Tips_200x200.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":589,"url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/virtual-private-network-vpn-security\/","url_meta":{"origin":3631,"position":2},"title":"Virtual Private Network (VPN) for Security","author":"Jerry Lucas","date":"January 1, 2015","format":false,"excerpt":"Virtual Private Network (VPN) for Security An open, public Wi-Fi or hotspot at a hotel, airport, coffee shop, restaurant, library, etc., provides a convenient free internet connection, but is a security risk for users, unless a Virtual Private Network is used.\u00a0 Cyber criminals may be eavesdropping to capture user names,\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/category\/security\/"},"img":{"alt_text":"Tech Tips","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/2014\/02\/Tech_Tips_120x80.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":585,"url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/air-gap-computer-network-security\/","url_meta":{"origin":3631,"position":3},"title":"Air Gap Computer Network Security","author":"Jerry Lucas","date":"December 30, 2014","format":false,"excerpt":"Air Gap Computer Network Security An air gap or air wall is a computer network security measure.\u00a0 Rather than have all your computers connected to a single local network, by network cables and\/or wireless connections, one or more computers are offline, not connected to the local network or internet.\u00a0 The\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/category\/security\/"},"img":{"alt_text":"air gap computer network security","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/air-gap-computer-network-security-320x200.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1809,"url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/pdf-password-protection-and-encryption\/","url_meta":{"origin":3631,"position":4},"title":"PDF Password Protection and Encryption","author":"Jerry Lucas","date":"December 21, 2015","format":false,"excerpt":"PDF Password Protection and Encryption PDF Password protection is an optional feature with some software when creating a PDF file. A User password may be added by the file creator to control opening and viewing the file.\u00a0 An Owner password may be added by the file creator to control file\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/category\/security\/"},"img":{"alt_text":"PDF password protected","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/PDF-password-protected-250x200.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":239,"url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/spideroak-secure-cloud-storage\/","url_meta":{"origin":3631,"position":5},"title":"SpiderOak Secure Cloud Storage","author":"Jerry Lucas","date":"January 31, 2014","format":false,"excerpt":"SpiderOak Secure Cloud Storage SpiderOak\u00ae is one of many cloud storage vendors to choose from.\u00a0 Vendors usually provide several gigabytes (GB) of free cloud storage, with an option to buy more storage.\u00a0 However, users must be careful to read the specifications and terms of service to determine if the stored\u2026","rel":"","context":"In &quot;Product Review&quot;","block_context":{"text":"Product Review","link":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/category\/product-review\/"},"img":{"alt_text":"SpiderOak encrypted online backup sync","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/SpiderOak.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/posts\/3631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/comments?post=3631"}],"version-history":[{"count":2,"href":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/posts\/3631\/revisions"}],"predecessor-version":[{"id":10615,"href":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/posts\/3631\/revisions\/10615"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/media\/3639"}],"wp:attachment":[{"href":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/media?parent=3631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/categories?post=3631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/tags?post=3631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}