You would have heard about the Cryptolocker virus or maybe you or one of your colleagues were affected by it. While we know what to look out for, it is still causing havoc over the internet to this day. We have found 2 solutions that can help protect your business and its documents.
Webroot focuses on delivering a high-performance endpoint malware prevention and management solution. It offers highly accurate and effective endpoint malware prevention with a range of additional endpoint security shield capabilities that keep both the user and the device safe.
We have recently carried out some extensive testing of antivirus and malware products so we can ensure we are offering our customers the best possible solution. Through this testing we have decided to switch our Managed Antivirus solution to a cloud delivered product called Webroot. Webroot offers many advantages over traditional definition based Antivirus software using its cloud threat intelligence platform that automatically protects against new threats the moment they are discovered. Traditional definition based AV requires an endpoint to download the latest definitions and apply them before being fully protected, which can cause delays between global detection and endpoint protection.
Webroot runs a small footprint so has little performance impact on the endpoint enabling the end user to work without delay or interruptions. Throughout our testing Webroot was the only product that consistently prevented the current variants of the cryptolocker infection discovered through email encoded attachments. Since deployment at some of our Managed sites it has prevented three cases of the crypto infection.
Notorious for obvious reasons the ‘ransomeware’ virus, Cryptolocker takes advantage of you by encrypting files (e.g word docs, excel, pdfs in your ‘my documents’ or ‘desktop’) sitting on your computer’s hard drive and network shares and then holds you to ransom for the unlock key. Webroot, the virus protection we use, helped many of our customers avoid costly ransoms but the clients that didn’t have any concerns where those using an EIM System (Enterprise Information Management) called M-Files. Although the M-Files interface looks like you’re working with network shares, the documents have to be ‘Checked Out’ to be edited and ‘Checked In’ when finished. Cryptolocker can certainly see the files like they’re sitting on a network share but isn’t able to check the documents in or out. Even if it could, M-Files keeps a version history of every single change that’s ‘Checked In’, so it would just be a matter of ‘Rolling Back’ to the previous version to access the unencrypted version of the file.
M-Files is not just another document management system that helps you find every thing in your business, or manages your projects and business processes.