{"id":5670,"date":"2014-08-12T10:00:04","date_gmt":"2014-08-12T14:00:04","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=5670"},"modified":"2020-02-26T10:54:33","modified_gmt":"2020-02-26T15:54:33","slug":"protecting_unique_data","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/protecting_unique_data\/5670\/","title":{"rendered":"Protect What You Value Most: Your Unique Data"},"content":{"rendered":"<p>One of the themes of this and last year is the surprising prominence of malware serving little purpose besides corrupting the data you need and demanding money to restore that data to you. Of course \u2013 as we\u2019ve always said with ransomware and other schemes \u2013 there is no guarantee that you\u2019ll ever see malware encrypted or blocked data ever again, even if you do pay the ransom. Although, as we learned at Black Hat this year, <a href=\"https:\/\/threatpost.com\/behind-the-cryptolocker-disruption\" target=\"_blank\" rel=\"noopener nofollow\">the crew behind CryptoLocker was fairly true to their word in this respect<\/a>.<\/p>\n<p>Still it is better to not pay $300 to a criminal organization for data that belongs to you in the first place, which is precisely why now \u2014 rather than post-infection \u2014 is the time to plan for data loss. I\u2019m not going to sit here and tell you with any degree of confidence that one of your devices will become infected, because I just don\u2019t know. What I will tell you is <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptolocker-is-bad-news\/\" target=\"_blank\" rel=\"noopener nofollow\">that CryptoLocker is a total nightmare<\/a> and that it is by no means the only <a href=\"https:\/\/threatpost.com\/cryptolocker-ransomware-alive-and-evolving-says-researcher\" target=\"_blank\" rel=\"noopener nofollow\">malware threatening your data<\/a>.<\/p>\n<p>Even without malware, there is no shortage of ways for us all to lose the information we need. Corrupted hard-drives are as much a nightmare as CryptoLocker. So is dropping your phone in the pool, having your tablet stolen, <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-avoid-gadget-loss\/\" target=\"_blank\" rel=\"noopener nofollow\">losing a gadget<\/a> or any number of other maladies that ultimately rob you of the data you need and rely on.<\/p>\n<div class=\"pullquote\">It is better to not pay $300 to a criminal organization for data that belongs to you in the first place<\/div>\n<p>The first thing you need to do is make sure you are performing regular back-ups of the data you care about. If you have a Mac, Apple\u2019s Time Machine function along with a dedicated external hard-drive will perform these backups for you. Windows, of course, has an automatic backup feature as well.<\/p>\n<p>In fact, the smarter among us are working with multiple backups; one you control (like and external hard drive) and one you don\u2019t control (like a trusted cloud storage provider). This way, if something improbably terrible happens, like your computer becomes infected with and\/or destroyed by malware that somehow also corrupts the external hard-drive connected to your machine, you have a third, cloud-based recovery option.<\/p>\n<p>The other side of the equation is preventing an infection before it happens. There are two ways of doing this: one is to be smart about what you click on and intentionally or inadvertently download on your computer. The pitfall here is that we\u2019re only humans. Humans make mistakes \u2014 not to mention cybercriminals aren\u2019t dumb. They make a living off tricking people like us into installing bad things on our computers. So the other way of preventing infection is to let the machines do it for you by installing a trusted security solution.<\/p>\n<p>We recommend Kaspersky Internet Security Multi-Device \u2013 or as we affectionately call it \u2014 KIS MD (kiss-emm-dee). This is going to protect all of your devices from nearly any threat or infection. The Kaspersky Security Network is always running, always vigilant. If a new virus pops up on a Kaspersky protected machine in New Zealand, the KSN writes a detection signature for it and you are protected in mere minutes, wherever you are. The likelihood of any of your devices becoming infected by a virus unknown to the KSN is astronomically low. Even if you are infected, KIS MD will remove the infection on any device running the solution.<\/p>\n<p>If you follow all these instructions, you\u2019ll be protected against malware that could hurt your machines and the data on them, but you also have contingency plans in place if the unlikely occurs.<\/p>\n<p>With security, a little bit of thinking goes a long way.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Malware-driven data loss is a serious problem, so run an antivirus solution and back up your machines<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fta8Z&amp;text=%23Malware-driven+data+loss+is+a+serious+problem%2C+so+run+an+antivirus+solution+and+back+up+your+machines\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Losing your work or personal data is a computing worst case scenario. While there is no shortage of ways you can lose your data, there are also a number of protections that can help. <\/p>\n","protected":false},"author":219,"featured_media":5671,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[260,180,454,43,97,131],"class_list":{"0":"post-5670","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-data-protection","9":"tag-kaspersky-internet-security","10":"tag-multi-device","11":"tag-privacy","12":"tag-security-2","13":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/protecting_unique_data\/5670\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/protecting_unique_data\/3892\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/protecting_unique_data\/3797\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/protecting_unique_data\/4283\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/protecting_unique_data\/4542\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/protecting_unique_data\/4522\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/protecting_unique_data\/5670\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/protecting_unique_data\/5670\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5670"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5670\/revisions"}],"predecessor-version":[{"id":33280,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5670\/revisions\/33280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5671"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}