SpamScams.net
  • Spam Emails
    • Affiliate Spam
    • Email Spam News
    • iPhone Spam
    • Link Building Spam
    • Link Exchange Spam
    • Pharmacy Spam
    • SEO Spam
    • Spam Email
    • Spam Email Alerts
    • Web Design Spam
  • Stop Spam Tips
  • Fraud Alerts
  • Fraud Protection Tips
  • Identity Theft Scams
Select Page

Best Practices For Recovery From the Malicious Erasure of Files

by SpamHater | Jan 21, 2012 | Stop Spam Tips

Joint FBI and DHS Public Service Announcement:

Cyber criminals can damage their victim’s computer systems and data by changing or deleting files, wiping hard drives, or erasing backups to hide some or all of their malicious activity and tradecraft. By wiping, or “zeroing out,” the hard disk drives, which overwrites good data with zeros or other characters, the criminals effectively erase or alter all existing data, greatly impeding restoration. This sort of criminal activity makes it difficult to determine whether criminals merely accessed the network, stole information, or altered network access and configuration files. Completing network restoration efforts and business damage assessments may also be hampered.

The FBI and DHS encourage businesses and individuals to employ mitigation strategies and best practices such as:

  • Implement a data back-up and recovery plan to maintain copies of sensitive or proprietary data in a separate and secure location. Backup copies of sensitive data should not be readily accessible from local networks.
  • Regularly mirror and maintain an image of critical system files.
  • Encrypt and secure sensitive information.
  • Use strong passwords, implement a schedule for changing passwords frequently, and do not reuse passwords for multiple accounts.
  • Enable network monitoring and logging where feasible.
  • Be aware of social engineering tactics aimed at obtaining sensitive information.
  • Securely eliminate sensitive files and data from hard drives when no longer needed or required.

The US-CERT Web page at www.us-cert.gov hosts a wide range of tips, best practices, and threat information for business and home users.

To receive the latest information about cyber schemes, please visit the FBI Web site and sign up for e-mail alerts by clicking on one of the red envelopes.

If you have been a victim of cyber crime, please file a report with the Internet Crime Complaint Center at www.IC3.gov.

Web Hosting

Why We’re Here

SpamScams is the Ultimate Spam Email Archive. Shedding light on email spam, scams, identity theft, and phishing schemes.

The purpose of SpamScams.net is to inform, not promote spam. Please DO NOT believe the spam email you receive. Even more importantly, DO NOT reply to them, DO NOT contact them, and DO NOT click on any links which we may have missed deleting. Furthermore, the inclusion of a company name(s) in spam emails DOES NOT automatically infer wrongful doings on the part of the named company, only that a scammer may be using the name of a legitimate company in order to complete their ruse.

Spam Email Topics

2020 Election Bank Draft Bank of America Beneficiary CAN-SPAM Central Bank China Citibank Compensation Contact Form Covid-19 DHL Email Scam FBI Fraud Fraud Protection Google IC3 India Inheritance Internet Crime Complaint Center IRS Link Building Lottery Malware MoneyGram Nigeria Paraguay PayPal Phishing Ransomeware Republic of Benin Scam Search Engine Optimization SEO Spam Email Sweepstakes Tax Refund United Kingdom United Nations UPS Virus Web Design Western Union World Bank

Stop Spam Resources

  • CAN-SPAM Act: A Compliance Guide for Business
  • FBI
  • How to recognize Phishing Scams
  • Looks Too Good To Be True
  • PayPal : Report fake (phishing) email
  • PayPal : Report fake (spoof) websites
  • The Spamhaus Project
  • US-CERT

Identity Theft Resources

  • Equifax
  • Experian
  • FTC Identity Theft Site
  • Identity Theft Protection
  • Recover from Identity Theft Tips
  • Report Internet Fraud
  • TransUnion

Recent Posts

  • Spoofed FBI Internet Domains Pose Cyber and Disinformation Risks
  • Child Abductors Potentially Using Social Media or Social Networks to Lure Victims In Lieu of an In-Person Ruse
  • FBI Cyber Strategy
  • A COVID 19-Driven Increase in Telework from Hotels Could Pose a Cyber Security Risk for Guests
  • Spoofed Internet Domains and Email Accounts Pose Cyber and Disinformation Risks to Voters

Popular Posts

  • Orphanage Donation Email Scam
  • Mrs Rose Williams Check Funds Phishing Scheme
  • Mrs Grace Williams Business Opportunity Email Scam
  • Mr Adebayo Shoyinka Paymaster General Nigeria Beneficiary Scam
  • Fraudulent Notification Deceives Consumers Out of Thousands of Dollars
  • About
  • What is Identity Theft
  • Sitemap
© 2020 SpamScams.net All rights reserved. WordPress updates by Kristof Creative