Amountis a 12 weekWebdevelopmentIOSandyourexdesignedbootcampintendedtoitfulltimejob.
Theindustrylearned a codeatdevmountaindotcom i n E i N E.
SpecializingnetworktrainingwithhandsonlabsonsitebootcampsandfocusonoverinthebestITonlinenetworkingcoursesat i n e dotcomplexorwasscrutinizedandflowdatauserscandeterminewhattrafficisonthework.
Soifyouthinkofitas a pieceofmalware, a virusor a worm, itismucheasiertounderstandhowtopreventransomwareinfectionssothatyoudon't haveproblemsonyoursystems.
SooneofthereasonsthatWindow's X P wassovulnerabletovirusesandspywareandallthatkindofstuffbackinthedaywasthatitsimplywasnotdesignedforanerawheneverybodywasgoingtohavealwaysonbroadbandconnection.
Soessentiallyabouttheexactsametimewhenthose x p cameoutand D.
S L becamenormal.
AndthereforeWindows X P justgotevisceratedwithvirusesandspyware.
Andsofor a lotofissuesthatwillcomeupifyou'reusingthelatestversionoftheMicrosoftoperatingsystemorwhateveroperatingsystem, itwillprevent a lotofproblems.
OneoftheissueswithWindowsXBisthere's still a lotofWindows X P intheworld, andtheissueisisthatitwasnotbuiltforthemodernworld.
Sothere's a lotofinfections.
There's a lotofproblemsthatcangetintoWindows X p thatwillsimplyneverbefixed.
So I knowifyouloveWindowseven, ifyouloveWindowseven, it's hardtogiveitup.
NotgoinguptheWindows 10 Atthispoint, I wouldarguefrom a securitystandpoint, especiallywhenwestartlookingtheseransom, wherethesenewattacksthatarebeingpresentedyoushouldbeuponthelatestMicrosoftoperatingsystembecausehere's thething.
Ifyoudon't trustWindowisdead, Whatdoesthatsayaboutyouknow, a 67 yearoldWindowsevenoperatingsystem?
Soagain, whenever, whenever a pieceofsoftwaregoesoutintothethetwotouseintheworldmanytimestherearevulnerabilitieswiththatsoftwarethatwillbefixedbypatchesorupdatesdowntheroad.
SoMicrosoftwillputout a newoperatingsystem, andthenanybodyknowsifit's a yearafterthatoperatesystemcameout, you'regonnahavetoyouhavetodownloadthreehoursworthofupdates.
Oneissuethatcomesupis a lotofpeoplewhentheythinkaboutcleaninguptheircomputers, whattheydoistheygothroughandtheydeleteTheatheRecyclebinallthestuffintherecyclebin.
They'llgoandthey'lldeletefiles.
Butwhattheywillneverdoisuninstallapplicationsthattheydon't useanymoreastheexample I talkedaboutbefore.
Ifyouhave a Java, ifyouhaveAdobeFlash, ifyouhaveAdobeAcrobat, ifyouhavesomeotherkindofoldsoftwareonyourPCoryourcomputer, thatcouldbe a vulnerabilitytoyourcomputer, andespeciallyifyouneveruseit.
Youcan't rememberthelasttimeyouusedit.
Manytimesthatsoftwaredoesn't getupdated.
Andbasicallythat's just a gapingsecurityholewhereifyoudon't usethesoftwareanyway, whydoyouhaveitthere?
Willyouseethis a lotintheenterpriseenvironment, wherethebusinessenvironmentwherecomputerswillbeusedfor 345 and 10 yearswherethesecretarywe'llhave a computeranditwillstillhavequickbooksonit, eventhoughtheydon't useQuickBooksandwe'llstillhavetheadobecreativesuitebecausefiveyearsagosomebodydownloadedtheadobecreativesuitetheydon't need.
ThereisaninstancerecentlywhereIBM I thinktheysentout 15,000 USBdrivesthathasinfactbeeninfected.
Soevenwhenyou'regetting a USBdrivefrom a knowngoodvendor, therealityisistherearenoknowngoodvendors.
AnyUSBdrivecouldcause a problem.
So I wouldargue, You'vegotGoogledrive, you'vegotDropbox, you'vegotanyofthecloudserviceisifyouneedtomovefilesandfoldersaround, itismuchbettertodoitthroughthoseclouds.
Oneofthebestwaystobeabletolockdownyourcomputersothatransomwareisnotinstalledonyoursystemistomakesureyouusepermissionsappropriatelyonyourcomputer, basically, beingabletouse a security.
Sowheneveryoulogintoyourcomputer, there's a securityprofilewhenyoulogin.
Whetheryou'reusingWindows, whetherusingMacwherethey'reusing a differentoperatingsystem, dependingonwhattypeofuseryoulogin, asyouwillhavetheabilitytododifferentthings.
Thereasonthatwormsandvirusesandmalwareransomwarecanrunsorampantthroughenterpriseenvironmentsisbecausenormallythosesecuritypermissionshavenotbeensetupappropriately, sorememberWhenanexecute a blegoesontoyourPC, itwillbeabletodowhateveryoucandoas a useronlywillbeabletodoitabout 1000 timesfaster.
Soessentially, whenthatexecute a blegoesontoyourPCandwhenit's autorun, itwillthenhavethepermissionsthatyouhave.
Sothisis a thingwe'vebeentalkingaboutforyearsisadministrators, evenadministrators, evenadministratorsshouldhave a normallockeddownuseraccountwheretheirchecktheiremailandtheydotheirworddocksanddoeverythingelse.
Sothisis a bigdealnow, especiallysincewe'reusingfarmorcloudserviceissoifyougoback 10 years, manytimeusershadtosharefilesandfoldersbetweenindividualcomputersonthenetwork, andinordertodothat, theydidn't needtonothavefirewallssothattheycouldaccessthosefilesandfolders.
SoifBobneededtoget a fileoffofSuzeComputerthensuesfilesharinghadtobeopenandthey'recorrect.
Forindividualsystemswithin a networktobeaboutcommunicatewitheachother, theyneedtocommunicatewiththeserver, andtheyneedtobeabletocommunicatewiththeoutsideworld.
But 1 to 1, theydon't needtocommunicatewitheachother.
Essentially, thenetworkoflanguageandthenormalprotocolthatyouhearabouthis T C P I.
P usuallyversionfour, andsothat's howyoucommunicatewithdifferentcomputersandhowyoucommunicatewiththeoutsideworld, andyouabsolutelyneedthat.
Butontheotherhand, there's thereareotherprotocolsthathavebeenusedovertheyearsandmayevenhave a usenow, butnotnecessarilyinyourenvironment.
Sothingslike S and M P SimpleNetworkManagementProtocol S and M P cangive a tremendousamountofinformationaboutthedifferentcomputersonyournetwork, manytimestoanycomputerthatknowstoaskforthatinformation.
Well, theMaurinformation a wormor a virusorpieceofmalwarecanobtainaboutthelargernetwork.
Themorelikelyitiswillbeabletoinfectothercomputersonthenetworkbyturningoffthingslike S and M P byturningoffthingslikeICMPechorequestsbyturningoffthingssuchassharingonindividualcomputers.
Basically, thisis a waytosecuretheindividualcomputerssothatitcannotbeattackedfromothercomputersonthenetwork.
Thenicethingifyou'reusingdreammailthrough a Webinterface, ifyou'reusingGoogledocksifyou'reusingdropboxandallthosekindsofthingsistherealityis, isallofthatdataissimplyupontheInternet.
Evenifyourcomputergetsinfectedwithransomware, yourcomputercan't encrypt G mailserverscan't encryptGoogledriveforthemostpart, forthemostpart, itcan't encryptalloftheseotherdifferentInternetserviceprovider.
Thereisn't a cloudversionof, buttheonlywayyoucanaccessanddealwiththatapplicationServeristhroughthatremotedesktopinterfacesoyoucaninteractwiththeapplication.
Butit's notreadingyourUSBthumbdrives.
Itcan't beinfectedfromyourlocalcomputer.
Basically, itputs a layerbetweenyouandtheapplicationintheserverthatyou'redealingwithsothatthatserverislesslikelyfarlesslikelytobeinfected.
Buthere's a nicethingifyou'rerealizeheprofessional.
Ifyourealize a professional, youshouldhavealreadyplannedforthisright, becausewhetherit's ransomware, whetherit's a poorNATO, whetheryourharddrivesjustburstintoflames, therealityis, isyoushouldalwaysbeconcerned.
Isanicyprofessionalaboutallofyourdad a disappearingwhathappensifthatserverightthereliterallyjustdisappeared.
Thegreatspaghettimonstersaid I don't likethatserveranymore.
Andjustproofed, right?
Thisissomethingthatcanhappen.
Ransomwareagain.
Ransomwareis a waythedatacandisappear, butitisoneof a dozenwaysthatyourdaddycandisappear.
Sowhatyoureallyneedtomakesureisthatyouhave a gooddatabackuproutineandprayinplaceAllofyourservers, allofyourimportantinformationshouldbebeingbackedupregularly.
I'm notsimplysaying, Have a have a bay, a broadbandconnectiontosomewhereelsewheregetsbackedupbutwiththeransomware.
Ifransomwarecaninfectyourinfrastructureandyourinfrastructurehas a networkconnectiontoyourbackupinfrastructure, thentheoreticallytheransomwarecouldinfectyourlocalinfrastructure.
Allofyourlocalinfrastructurewasencrypted, butwehave a backupthathappens.
Beencrypted, too.
Sooneofthethingsyouneedtobethinkingaboutthis, howdoyoubackupalloftheimportantdataonyourinfrastructureandthenbeabletomoveitsomewhereelseandnothave a realtimeconnectionbetweenthetwolocations?
Whereifyougowhenyousendthem $500 or $2000 or $50,000 inBitcoin, there's noguaranteeyou'reactuallygoingtogetthedecryptionkeyssothatyoucangetyourdataback.
Youknow, theytalkabout a criminaljustice, therationalchoice, approachyourcriminaljustice.
Whydopeoplecommitcrimes?
Well, frankly, ifitpaysyou a craptonofmoney, that's a goodreasonfordoingso.
Ifyou'reinUkraineorifyou'reinthemiddleofMidwestUnitedStatesorifyou'resomewhereyou'renotreallysurehowyou'regonnapaythemortgage, howyou'regonnayou'regonnapayforyourfamilyandyoufindoutHey, if I cangetthislittlepieceofransomwareontopeople's computersandthenthey'llpayme a lotofmoney.
SimplyusingsecurenyaoranybasicpatchmanagementtomakingsureJavaandAdobeandallthatkindofstuffisupdatedisjust a basicsecuritything, evenupgradingtoWindows.
Ted.
A lotofcompaniesoneofproblemsthatthat I t peoplerunintohiscompaniesdon't wanttospendmoney.
Sevenisgoingtokeepworkingallthewayupuntilitdoesthatanymore, youknowyou'regoingtohavetoupgrade, sosimplydoingbasicsecurityroutinescanbe a goodwaytoprotectyoursystems.
Thisis a bigthing, especially, let's say, withupgradingyourWindowsoperatingsystems.
Now a lotofpeoplewillsay, But, Eli, youdon't understandourcompany.