<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>#CyberSecurityBasics Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/cybersecuritybasics/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/cybersecuritybasics/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Sun, 16 May 2021 22:24:07 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>#CyberSecurityBasics Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/cybersecuritybasics/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber Security Basics Ransomware</title>
		<link>https://www.l2cybersecurity.com/cyber-security-basics-ransomware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 17 May 2021 07:00:41 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#CyberSecurityBasics]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Basics]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2522</guid>

					<description><![CDATA[<p>This Cyber Security Basics Ransomware post is a short, simple primer for small business owners to understand more about #Ransomware. What is Ransomware? Ransomware is malicious software that will scramble all of the files that it can find on your device, on your network, even in the cloud and it will look for money to&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-basics-ransomware/">Cyber Security Basics Ransomware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This Cyber Security Basics Ransomware post is a short, simple primer for small business owners to understand more about #Ransomware.<span id="more-2522"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2522-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/Cyber-Security-Basics-Ransomware-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/Cyber-Security-Basics-Ransomware-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/05/Cyber-Security-Basics-Ransomware-lo.mp4</a></video></div>
<h3>What is Ransomware?</h3>
<p>Ransomware is malicious software that will scramble all of the files that it can find on your device, on your network, even in the cloud and it will look for money to unscramble the data from you, probably through using some kind of virtual currency like a Bitcoin.</p>
<h3>How does it get in?</h3>
<p>It can get in through a phishing email. Through somebody opening an attachment that contains malicious software or by clicking a link which takes you to a website that can download malicious software. It can also happen outside of your control by the criminals probing at any kind of remote access service that you have on your network. These can be penetrated and if they are, they can get into your network and they will scramble all of your data that they can see and it will also likely steal data from you beforehand and use that as a further leverage to get more money out of you for not revealing that data.</p>
<h3>How can I protect myself?</h3>
<p>It is possible to defend against ransomware by taking these following steps:</p>
<ol>
<li>You should only be using currently supported, up-to-date versions of software.</li>
<li>You should use some kind of anti-virus or anti-malware software.</li>
<li>Your staff should receive regular security awareness training so that they can recognise dodgy emails that will contain links or attachments that could compromise your setup.</li>
<li>You should also make sure that any remote access capabilities that you have is kept fully up-to-date and is well hardened.</li>
</ol>
<h3>How can I prevent having to pay?</h3>
<p>Backups are by far the best way to recover from a ransomware incident. I always recommend that small businesses use the 3-2-1 backup methodology. That is:</p>
<ul>
<li>Having three copies of your data, one copy being your live version</li>
<li>Having two copies on separate media such as an external hard drive or the cloud and</li>
<li>One copy is off-site and one copy is offline</li>
</ul>
<p>It is the offline copy that will help you recover from ransomware.</p>
<p>The other thing with backups is you must test your backups, because you don&#8217;t have a backup until you know it works. So</p>
<p>TEST.</p>
<p>YOUR.</p>
<p>BACKUPS!</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-basics-ransomware/">Cyber Security Basics Ransomware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/Cyber-Security-Basics-Ransomware-lo.mp4" length="39888275" type="video/mp4" />

			</item>
	</channel>
</rss>
