fbpx
Founder Institute Lagos Founder Institute Lagos Founder Institute Lagos
  • Home
  • About
  • Partners
  • Advertise
  • Contact
  • Signup to receive updates
Innovation | Startups | Funding | Tech Blog in Africa
Advertisement
  • Home
  • Startups
  • Hubs
  • Funding
  • WomenTech
  • CleanTech
  • Blockchain
No Result
View All Result
  • Home
  • Startups
  • Hubs
  • Funding
  • WomenTech
  • CleanTech
  • Blockchain
No Result
View All Result
Innovation | Startups | Funding | Tech Blog in Africa
No Result
View All Result
Home General

5 Hacks To Protect Your Device From Ransomware

by TechBuild.Africa
2016/10/25 - Updated on 2020/12/18
in General
PROTECTING YOUR DEVICE FROM MALWARE

PROTECTING YOUR DEVICE FROM MALWARE

Share on FacebookShare on Twitter
Tweet
Share
Share

Wikipedia says Ransomware is computer malware that installs secretly on a victim’s computer, executes a crypto virology (fatal) attack that adversely affects it, and demands a ransom payment to restore it.

In Africa, it is said, “it is better to look for a black goat during the day and not at night”. There things you care less about and that could be disastrous. Some people are yet to become internet victims. As internet and technology become indispensable in our everyday living, some people are somewhere strategizing how they will hack you, attack you and drain you.

Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it. More advanced malware encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them. The use of ransomware is becoming an increasingly popular way of extorting money due to the complete negligence of consumers and companies.

protecting-your-device-from-malware

RelatedPosts

Energy, AI and a Groovy New Tech Demo Area All on the Menu at Africa Tech Festival

Wikimedia Anambra Network sets to Mark a Year of Achievement and Awareness Campaign

IXPN, Medallion DC meet Stakeholders, discuss Internet Peering and Interconnectivity

Dr Krish crowns Technology Person of the Year at Tech Innovation Awards 2023

Below are the five best ways to protect your computer from ransomware

  • Have Antivirus Firewall & Antivirus Software installed

Having both antivirus firewall and anti-malware would be very beneficial. This software would help in identifying and filtering known suspicious files and other malicious behavior that would otherwise go unrecognized.
If the firewall fails for any reason, the anti-malware tool will be there to detect anomalies and eliminate the suspicious files that can potentially harm your computer. However, keep up to date your software.

Suggested Read: 5 Online Games To Play This Weekend

  • Always Cross Check Your Email

Most times we do not do some verification checks before obliging to someone who sends an email to us. I have received emails from a suspicious email address that was aimed at defrauding me, having known some of the hacks to avert these things, I need to apply caution.

It could be an email that requests you to download any file attachment. It doesn’t matter if the email comes from your bank, be sure to verify. Spammers or hackers might be disguised using someone you know, however, do not solely rely on the virtue of relationships.

  • Backup Your Data Regularly

Regularly backing up your files is germane when it comes to protecting your computer from ransomware. Even if you get hacked, you can still fall back to your backup data.

One of the best ways to back up your data is making use of the cloud without spending money on drives or flash. You can also opt to a safe location such as in an external hard disk, USB pen drive, or CD/DVDs.

  • Filter PDF and Exe Files

Cyber criminals are very smart; sometimes this ransomware comes in the form of Pdf or. Exe file extensions. Avoid downloading any .exe file from suspicious emails it is better to exchange executable files is via password protected zip files or through cloud services. It would be stress-free to dictate suspicious files if you have the default Windows option “hide known file extensions” turned off because then you’ll be able to see the files full extension.

  • Be Careful of Websites You Visit

Some websites are infected with ransomware; there is no lack of malicious sites on the web operated by hackers with the sole intention of stealing data from the visitor’s computer. You might have noticed how visiting suspicious and illegal sites can harm your computer, but still decided to do it. However, again, a reputable antivirus firewall can help you in this scenario by notifying you about the legitimacy of a particular website.

In conclusion, it is good to note that these hacks do not only apply to PC users, most cyber criminals attack your smartphones as well. However, those hacks can be used by smartphone users.

Join @techbuildafrica on Telegram
Tweet
Share
Share
ShareTweetShareSendShare

Subscribe us

Recent Posts

  • Anambra ICT Agency MD to Keynote Bossladylaw Business Challenge
  • Energy, AI and a Groovy New Tech Demo Area All on the Menu at Africa Tech Festival
  • Female Innovator? Apply for Africa Innovation Fellowship Program
  • Wikimedia Anambra Network sets to Mark a Year of Achievement and Awareness Campaign
  • IXPN, Medallion DC meet Stakeholders, discuss Internet Peering and Interconnectivity
  • Dr Krish crowns Technology Person of the Year at Tech Innovation Awards 2023
  • Nigeria Calls for Open, Secure Internet
  • Appraising OPPO’s Unwavering Commitment to Quality, Trustworthiness, Innovation, and Premium Excellence
  • Modernising Customer Communication is key to Improving Customer Experience
  • Stakeholders join Forces to support the Nigeria Innovation Summit 2023
Innovation | Startups | Funding | Tech Blog in Africa

© 2013-2021 techbuild.africa. All Rights Reserved.

Navigate Site

  • About
  • Contact
  • WE-Forum
  • Privacy
  • Sitemap
  • Terms
  • Blockchain
  • CleanTech

Follow Us

No Result
View All Result
  • Home
  • Startups
  • Hubs
  • Funding
  • WomenTech
  • CleanTech
  • Blockchain

© 2013-2021 techbuild.africa. All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In