On Mar 29, 2016, at 8:44 AM, Ridge Kennedy srk3nn3dy(a)gmail.com [trad-dance-callers]
And despite that, we have had two users get infected
Crypto-Locker type viruses that have propagated to servers that we had
to delete and replace with backups.
The crypto lock stuff is especially concerning -- it's not just
malicious -- it's a business. And so the bad guys have an incentive
to keep refining and flooding the internet with this stuff.
I work for a company that allows users to back their data up into our "cloud".
Starting in November 2013, we started encountering customers that had been hit with this
virus and wanted their files back. I never expected that it would persist for this long,
but I believe we have 10 to 20 phone calls a day from users hit with the virus.
We are able to restore their unencrypted files because we keep at least 2 copies of each
file. By the time they call us, we have backed up the "bad" version, but still
have the good version to return to them.
Up until a few months ago, this had all been in the abstract. However, two businesses
that different parts of my extended family work for have been hit (and were fixed because
they were users of the online backup software that keeps multiple versions), and a person
in my company got hit (even though we have all had training about suspicious emails, have
anti-virus software, etc.
I recommend that you keep you data backed up with two different methods, perhaps a local
external disk drive and some cloud storage system, that the system be automatic, that you
test it every so often by restoring an important file, and that you consider what would
happen if one of these encryption viruses encrypted every file reachable from your
Clark Baker, Belmont, MA