SlideShare a Scribd company logo
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
Our Inspiration From
Nelson Mandela
CONTENTS
“It always seems impossible until it’s done.”
Chalo @ Tindivanam!
Recently Inspace Chalo – the school management software team bagged a
prestigious order from Shri Ram School (CBSE) at Tindivanam.
Seen in the above picture is our Manager - Business Development –
Mr. Manivasahan, collecting the PO from Mr. T.Ramu, Principal of Shri Ram
School.
We wish CHALO team more such success stories in future!
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
INBOX
WELCOME TO THE CLUB…
Recently Inspace secured few prestigious client and added them to their
esteemed list of clientele. Some of them are,
- Mumbai
- Mumbai
- Chennai
- Chennai
- Tindivanam
- Palladam
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
CONTENTS
Welcome back to another edition of our BAIT Series, which aims primarily to
align business with technology. This month we would do touch upon a hot IT
topic across all industries – Ransomware!
The United States Department of Homeland Security (DHS), in collaboration
with Canadian Cyber Incident Response Centre (CCIRC), is releasing this Alert
to provide further information on ransomware, specifically its main
characteristics, its prevalence, variants that may be proliferating, and how
users can prevent and mitigate against ransomware.
Recently there has been a lot of clamour about data files being lost across
many companies. Users storing their files on their systems, find that one fine
morning they are not able to open them (after hours of laborious work on
them). Imagine the plight of cumulate data and editing work carried out for
weeks, months or even years’ together, especially for the accounting or
financial purposes!
The background information is that, destructive ransomware variants such as
Locky and Samas were observed to infect computers belonging to individuals
and businesses. Basically, it restricts users’ access to it until a ransom is paid
to unlock it.
Business Aligned IT (BAIT Series 15)
By Samuel Raj Anbudaiyan (Technology Auditor)
PREPARE FOR RANSOMWARE
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
CONTENTS Business Aligned IT (BAIT Series 15)
By Samuel Raj Anbudaiyan (Technology Auditor)
So what is Ransomware?
Ransomware is a type of malware that infects computer systems, restricting
users’ access to the infected systems. Ransomware variants have been
observed for several years and often attempt to extort money from victims
by displaying an on-screen alert. Typically, these alerts state that the user’s
systems have been locked or that the user’s files have been encrypted.
Users are told that unless a ransom is paid, access will not be restored. The
ransom demanded from individuals varies greatly but is frequently
Rs.15,000/- to 30,000/- (and must be paid in virtual currency, such as
Bitcoin).
Ransomware is often spread through phishing emails that contain malicious
attachments or through drive-by downloading. Drive-by downloading occurs
when a user unknowingly visits an infected website and then malware is
downloaded and installed without the user’s knowledge.
Crypto ransomware, a malware variant that encrypts files, is spread through
similar methods and has also been spread through social media, such as
Web-based instant messaging applications. Additionally, newer methods of
ransomware infection have been observed. For example, vulnerable Web
servers have been exploited as an entry point to gain access into an
organization’s network.
Impact of Ransomware
Ransomware encrypt the target data files using an algorithm that is almost
impossible to crack (or it might take years to break the encryption). Once
the files are encrypted without the “encryption key” the user cannot get the
data or information from the files as they are rendered unreadable by the
programs (like Documents or Spreadsheets).
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
CONTENTS Business Aligned IT (BAIT Series 15)
By Samuel Raj Anbudaiyan (Technology Auditor)
If the user tries to access the data or the files, they are asked to pay a
ransom amount to get data. These viruses spread through email, internet
and also through local networks. Thus before the user realises, all are
affected. Thus to get the files or data back, either the user is forced to pay-
up the amount specified or to lose their valuable data forever. Most users
end-up paying the amount, since they do not want to lose the data (with
years of work stored in them). The worst part is that even after paying the
amount some users do not get the valid “decryption key” to access their
data or files! And it is next to impossible to trace back the ransoming
parties.
Ransomware not only targets home users; businesses can also become
infected with ransomware, leading to negative consequences, including
• Temporary or permanent loss of sensitive or proprietary information,
• Disruption to regular operations,
• Financial losses incurred to restore systems and files, and
• Potential harm to an organization’s reputation.
As seen earlier, paying the ransom does not guarantee the encrypted files
will be released; it only guarantees that the malicious actors receive the
victim’s money, and in some cases, their banking information. In addition,
decrypting files does not mean the malware infection itself has been
removed.
Proactive Solution for Ransomware
Infections can be devastating to an individual or organization, and recovery
can be a difficult process that may require the services of a reputable data
recovery specialist.
Many security agencies recommend that users and administrators take the
following preventive measures to protect their computer networks from
ransomware infection:
• Employ a data backup and recovery plan for all critical information.
Perform and test regular backups to limit the impact of data or system loss
and to expedite the recovery process. Note that network-connected
backups can also be affected by ransom ware; critical backups should be
isolated from the network for optimum protection.
• Use application white listing to help prevent malicious software and
unapproved programs from running. Application white listing is one of the
best security strategies as it allows only specified programs to run, while
blocking all others, including malicious software.
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
CONTENTS Business Aligned IT (BAIT Series 15)
By Samuel Raj Anbudaiyan (Technology Auditor)
• Keep your operating system and software up-to-date with the latest
patches. Vulnerable applications and operating systems are the target of
most attacks. Ensuring these are patched with the latest updates greatly
reduces the number of exploitable entry points available to an attacker.
• Maintain up-to-date anti-virus software, and scan all software
downloaded from the internet prior to executing.
• Restrict users’ ability (permissions) to install and run unwanted software
applications, and apply the principle of “Least Privilege” to all systems and
services. Restricting these privileges may prevent malware from running or
limit its capability to spread through the network.
• Avoid enabling macros from email attachments. If a user opens the
attachment and enables macros, embedded code will execute the malware
on the machine. For enterprises or organizations, it may be best to block
email messages with attachments from suspicious sources. Follow safe
practices when browsing the Web.
• Do not follow unsolicited Web links in emails.
• Individuals or organizations are discouraged from paying the ransom, as
this does not guarantee files will be released. Report instances of fraud to
Internet Cyber Crime.
LOL!
Lets relax…
CONTENTS
Get in touch with us! All are encouraged to contribute towards the contents
of this newsletter. Please reach out to Editor’s Desk @
newsletter@inspacetech.com
(This newsletter is for private circulation only. The Editorial committee
reserves the right to publish contributed contents).
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!

More Related Content

PPTX
Industry reactions to wanna cry ransomware attacks
PDF
AI for Ransomware Detection & Prevention Insights from Patents
PDF
Cisa ransomware guide
PPTX
Distribution Industry: What is Ransomware and How Does it Work?
PPTX
Wannacry & Petya ransomware
PDF
10 best cybersecurity companies in healthcare for 2021
PPTX
Preventing lateral spread of ransomware
PPTX
Reducing the Impact of Cyber Attacks
Industry reactions to wanna cry ransomware attacks
AI for Ransomware Detection & Prevention Insights from Patents
Cisa ransomware guide
Distribution Industry: What is Ransomware and How Does it Work?
Wannacry & Petya ransomware
10 best cybersecurity companies in healthcare for 2021
Preventing lateral spread of ransomware
Reducing the Impact of Cyber Attacks

What's hot (20)

PPT
Securing Your Small Business Network
PPTX
Anatomy of a Ransomware Event
PPTX
Ransomware: A Perilous Malware
PPTX
Cybersecurity…real world solutions
PPTX
PACE-IT, Security+3.1: Types of Malware
PPTX
Cybersecurity Training
DOC
Data security
PPTX
Malware program by mohsin ali dahar khairpur
PDF
eSentinel™ – 360° Cybersecurity Platform Simplified
PPTX
3 Tips to Stay Safe Online in 2017
PDF
IT security in 2021: Why Ransomware Is Still The Biggest Threat
PPT
Safeguard your enterprise against ransomware
PPTX
Cybersecurity
PPTX
Hyphenet Security Awareness Training
PPTX
Security threats
PDF
Triangulum - Ransomware Evolved - Why your backups arent good enough
PDF
First Union Bank Report
PPTX
Uncover What's Inside the Mind of a Hacker
PDF
CyberSecurity Series Malware slides
PDF
Cyber Security - Boundary Defense Mechanisms
Securing Your Small Business Network
Anatomy of a Ransomware Event
Ransomware: A Perilous Malware
Cybersecurity…real world solutions
PACE-IT, Security+3.1: Types of Malware
Cybersecurity Training
Data security
Malware program by mohsin ali dahar khairpur
eSentinel™ – 360° Cybersecurity Platform Simplified
3 Tips to Stay Safe Online in 2017
IT security in 2021: Why Ransomware Is Still The Biggest Threat
Safeguard your enterprise against ransomware
Cybersecurity
Hyphenet Security Awareness Training
Security threats
Triangulum - Ransomware Evolved - Why your backups arent good enough
First Union Bank Report
Uncover What's Inside the Mind of a Hacker
CyberSecurity Series Malware slides
Cyber Security - Boundary Defense Mechanisms
Ad

Viewers also liked (11)

PDF
Newsletter connect - April 2016
PDF
Pioneer Investments_Press Release_Emerging Markets Bond Short-Term
PDF
MBA TRANSCRIPT CARIDAD
PDF
Presenting with Power Certificate
PDF
PDF
PPTX
Graffiti
PDF
Carta Prime Life
PDF
2012年3月 株主向け説明会資料
PDF
Manual Handling Certificate
PPTX
Ngo.pl: Jak pisać, żeby nas czytali?
Newsletter connect - April 2016
Pioneer Investments_Press Release_Emerging Markets Bond Short-Term
MBA TRANSCRIPT CARIDAD
Presenting with Power Certificate
Graffiti
Carta Prime Life
2012年3月 株主向け説明会資料
Manual Handling Certificate
Ngo.pl: Jak pisać, żeby nas czytali?
Ad

Similar to Newsletter connect - June 2016 (20)

PPSX
Cyber Security Awareness Month 2017-Nugget 6
PDF
2016 CYBERSECURITY PLAYBOOK
PDF
Malware Attacks | How To Defend Organizations From It?
PDF
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
PDF
Cyber Security and Data Privacy - presentation
PDF
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
PDF
FBI Memo on How to Protect Yourself from Ransomware
PPTX
Ransomware : A cyber crime without solution ? by Prashant Mali
DOCX
5 ways to strengthen cybersecurity in the workplace
PDF
Corona| COVID IT Tactical Security Preparedness: Threat Management
PDF
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
PPTX
Cyber Security and prevention Presentation.pptx
PPTX
Lecture 3.pptx
PPTX
Cyber security and its controls.pptx
PDF
Should You Pay Ransomware.pdf
PPTX
Cyber security awareness for end users
PDF
Client-Side Penetration Testing Presentation
PDF
Asset Discovery in India – Redhunt Labs
PPTX
Introduction to Cyber-Security beginners.pptx
PPTX
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber Security Awareness Month 2017-Nugget 6
2016 CYBERSECURITY PLAYBOOK
Malware Attacks | How To Defend Organizations From It?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyber Security and Data Privacy - presentation
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
FBI Memo on How to Protect Yourself from Ransomware
Ransomware : A cyber crime without solution ? by Prashant Mali
5 ways to strengthen cybersecurity in the workplace
Corona| COVID IT Tactical Security Preparedness: Threat Management
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Cyber Security and prevention Presentation.pptx
Lecture 3.pptx
Cyber security and its controls.pptx
Should You Pay Ransomware.pdf
Cyber security awareness for end users
Client-Side Penetration Testing Presentation
Asset Discovery in India – Redhunt Labs
Introduction to Cyber-Security beginners.pptx
Cyber-Espionage: Understanding the Advanced Threat Landscape

More from Arish Roy (20)

PPTX
Technology Audit | IT Audit | ERP Audit | Database Security
PDF
Daughters perfection
PDF
Newsletter connect - Jan 2017
PDF
Newsletter Connect - Nov 2016
PDF
Newsletter Connect - Nov 2016
PDF
Newsletter connect - Sep 2016
PDF
Newsletter Connect - August 2016
PDF
Newsletter connect - July 2016
PDF
Newsletter Connect - May
PDF
Newsletter Connect - Mar 2016
PDF
Newsletter connect - Feb 2016
PDF
Newsletter connect - Jan 2016
PDF
Newsletter connect - Nov 2015
PDF
Newsletter connect - Oct 2015
PDF
Newsletter Connect - Sep 2015
PDF
Newsletter Connect - August
PDF
Newsletter connect - July 2015
PDF
Inspace connect - June 2015
PDF
Inspace connect - May 2015
PPTX
Inspace Connect
Technology Audit | IT Audit | ERP Audit | Database Security
Daughters perfection
Newsletter connect - Jan 2017
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
Newsletter connect - Sep 2016
Newsletter Connect - August 2016
Newsletter connect - July 2016
Newsletter Connect - May
Newsletter Connect - Mar 2016
Newsletter connect - Feb 2016
Newsletter connect - Jan 2016
Newsletter connect - Nov 2015
Newsletter connect - Oct 2015
Newsletter Connect - Sep 2015
Newsletter Connect - August
Newsletter connect - July 2015
Inspace connect - June 2015
Inspace connect - May 2015
Inspace Connect

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
1. Introduction to Computer Programming.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PPT
What is a Computer? Input Devices /output devices
PPTX
Chapter 5: Probability Theory and Statistics
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
The various Industrial Revolutions .pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Getting Started with Data Integration: FME Form 101
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
1. Introduction to Computer Programming.pptx
Module 1.ppt Iot fundamentals and Architecture
What is a Computer? Input Devices /output devices
Chapter 5: Probability Theory and Statistics
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
cloud_computing_Infrastucture_as_cloud_p
WOOl fibre morphology and structure.pdf for textiles
The various Industrial Revolutions .pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
NewMind AI Weekly Chronicles - August'25-Week II
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A comparative study of natural language inference in Swahili using monolingua...
Group 1 Presentation -Planning and Decision Making .pptx
Getting started with AI Agents and Multi-Agent Systems
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

Newsletter connect - June 2016

  • 1. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! Our Inspiration From Nelson Mandela CONTENTS “It always seems impossible until it’s done.”
  • 2. Chalo @ Tindivanam! Recently Inspace Chalo – the school management software team bagged a prestigious order from Shri Ram School (CBSE) at Tindivanam. Seen in the above picture is our Manager - Business Development – Mr. Manivasahan, collecting the PO from Mr. T.Ramu, Principal of Shri Ram School. We wish CHALO team more such success stories in future! CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS...
  • 3. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! INBOX WELCOME TO THE CLUB… Recently Inspace secured few prestigious client and added them to their esteemed list of clientele. Some of them are, - Mumbai - Mumbai - Chennai - Chennai - Tindivanam - Palladam
  • 4. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! CONTENTS Welcome back to another edition of our BAIT Series, which aims primarily to align business with technology. This month we would do touch upon a hot IT topic across all industries – Ransomware! The United States Department of Homeland Security (DHS), in collaboration with Canadian Cyber Incident Response Centre (CCIRC), is releasing this Alert to provide further information on ransomware, specifically its main characteristics, its prevalence, variants that may be proliferating, and how users can prevent and mitigate against ransomware. Recently there has been a lot of clamour about data files being lost across many companies. Users storing their files on their systems, find that one fine morning they are not able to open them (after hours of laborious work on them). Imagine the plight of cumulate data and editing work carried out for weeks, months or even years’ together, especially for the accounting or financial purposes! The background information is that, destructive ransomware variants such as Locky and Samas were observed to infect computers belonging to individuals and businesses. Basically, it restricts users’ access to it until a ransom is paid to unlock it. Business Aligned IT (BAIT Series 15) By Samuel Raj Anbudaiyan (Technology Auditor) PREPARE FOR RANSOMWARE
  • 5. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! CONTENTS Business Aligned IT (BAIT Series 15) By Samuel Raj Anbudaiyan (Technology Auditor) So what is Ransomware? Ransomware is a type of malware that infects computer systems, restricting users’ access to the infected systems. Ransomware variants have been observed for several years and often attempt to extort money from victims by displaying an on-screen alert. Typically, these alerts state that the user’s systems have been locked or that the user’s files have been encrypted. Users are told that unless a ransom is paid, access will not be restored. The ransom demanded from individuals varies greatly but is frequently Rs.15,000/- to 30,000/- (and must be paid in virtual currency, such as Bitcoin). Ransomware is often spread through phishing emails that contain malicious attachments or through drive-by downloading. Drive-by downloading occurs when a user unknowingly visits an infected website and then malware is downloaded and installed without the user’s knowledge. Crypto ransomware, a malware variant that encrypts files, is spread through similar methods and has also been spread through social media, such as Web-based instant messaging applications. Additionally, newer methods of ransomware infection have been observed. For example, vulnerable Web servers have been exploited as an entry point to gain access into an organization’s network. Impact of Ransomware Ransomware encrypt the target data files using an algorithm that is almost impossible to crack (or it might take years to break the encryption). Once the files are encrypted without the “encryption key” the user cannot get the data or information from the files as they are rendered unreadable by the programs (like Documents or Spreadsheets).
  • 6. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! CONTENTS Business Aligned IT (BAIT Series 15) By Samuel Raj Anbudaiyan (Technology Auditor) If the user tries to access the data or the files, they are asked to pay a ransom amount to get data. These viruses spread through email, internet and also through local networks. Thus before the user realises, all are affected. Thus to get the files or data back, either the user is forced to pay- up the amount specified or to lose their valuable data forever. Most users end-up paying the amount, since they do not want to lose the data (with years of work stored in them). The worst part is that even after paying the amount some users do not get the valid “decryption key” to access their data or files! And it is next to impossible to trace back the ransoming parties. Ransomware not only targets home users; businesses can also become infected with ransomware, leading to negative consequences, including • Temporary or permanent loss of sensitive or proprietary information, • Disruption to regular operations, • Financial losses incurred to restore systems and files, and • Potential harm to an organization’s reputation. As seen earlier, paying the ransom does not guarantee the encrypted files will be released; it only guarantees that the malicious actors receive the victim’s money, and in some cases, their banking information. In addition, decrypting files does not mean the malware infection itself has been removed. Proactive Solution for Ransomware Infections can be devastating to an individual or organization, and recovery can be a difficult process that may require the services of a reputable data recovery specialist. Many security agencies recommend that users and administrators take the following preventive measures to protect their computer networks from ransomware infection: • Employ a data backup and recovery plan for all critical information. Perform and test regular backups to limit the impact of data or system loss and to expedite the recovery process. Note that network-connected backups can also be affected by ransom ware; critical backups should be isolated from the network for optimum protection. • Use application white listing to help prevent malicious software and unapproved programs from running. Application white listing is one of the best security strategies as it allows only specified programs to run, while blocking all others, including malicious software.
  • 7. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! CONTENTS Business Aligned IT (BAIT Series 15) By Samuel Raj Anbudaiyan (Technology Auditor) • Keep your operating system and software up-to-date with the latest patches. Vulnerable applications and operating systems are the target of most attacks. Ensuring these are patched with the latest updates greatly reduces the number of exploitable entry points available to an attacker. • Maintain up-to-date anti-virus software, and scan all software downloaded from the internet prior to executing. • Restrict users’ ability (permissions) to install and run unwanted software applications, and apply the principle of “Least Privilege” to all systems and services. Restricting these privileges may prevent malware from running or limit its capability to spread through the network. • Avoid enabling macros from email attachments. If a user opens the attachment and enables macros, embedded code will execute the malware on the machine. For enterprises or organizations, it may be best to block email messages with attachments from suspicious sources. Follow safe practices when browsing the Web. • Do not follow unsolicited Web links in emails. • Individuals or organizations are discouraged from paying the ransom, as this does not guarantee files will be released. Report instances of fraud to Internet Cyber Crime.
  • 8. LOL! Lets relax… CONTENTS Get in touch with us! All are encouraged to contribute towards the contents of this newsletter. Please reach out to Editor’s Desk @ newsletter@inspacetech.com (This newsletter is for private circulation only. The Editorial committee reserves the right to publish contributed contents). • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL!