Is your data safe from Ransomware? 4 ways to find out.
John Iacono • April 11, 2017

April 11, 2017

Now that you have read and implemented our 4 step guide to stopping ransomware , you probably want to test to see just how vulnerable your system is. Here are our top four ways to confirm that you and your data are as safe as possiblehacked-2127635__340.png

  • Phishing Tests
  • Vulnerability Scans
  • Penetration Tests
  • Network Assessment

Phishing Tests:

We told you that hackers are recruiting your employees and often send phishing emails as a way to gain access to your system.  These emails trick the end user into giving away sensitive information that is then used to hack your network. What we haven’t told you until now is you can (and should!) do regular phishing tests yourself.  Meaning you send emails that resemble a real phishing email as a way to test your teams savviness. You, or your IT professional , can determine how often the test email goes out, what they look like, and ensure too many people don’t receive at once. Once the test is complete, you receive a list that identifies who clicked on the link and when.

Vulnerability scans are a great way to test for weaknesses in your network. This technique simply cans your network and reports on areas where your security measures fall short.

Penetration Tests, also called ‘pen tests’, describe a situation in which you actively try to hack your network as a way of discovering your systems weaknesses. It is important that these tests are done by neutral third party firms, not the firm or employee who oversees your network.

Similar to a vulnerability scan, a network assessment helps to spot weakness in your network. Unlike a vulnerability scan, a network assessment involves an onsite walk through and evaluation of your infrastructure. A complete network assessment should end with a discussion of pain points in addition to providing short and long term recommendations.

Check out our  blog  to learn more about why ransomware attacks are on the rise 

Visit our Cyber Security page for more information.

Related Articles: 

By John Iacono August 1, 2025
For growing businesses, IT challenges can be unpredictable. One moment everything is humming along; the next, there’s a server failure, a phishing attack or a sudden compliance audit on your doorstep. If you have internal IT staff, you may assume you’re fully prepared, but the reality is that internal IT teams often get stretched thin,... The post How an Outsourced MSP Can be the Missing Piece for Your Tech Needs appeared first on Fairdinkum.
By John Iacono July 23, 2025
Not to play on stereotypes, but Geoff Corbett, professional services manager, says he fits the “nerdy IT person” label. For the past 18 years – and really throughout his life – Geoff has propelled his love of gaming and technology into a career. And we’re grateful to have him at Fairdinkum! His wide knowledge of... The post Geoff Corbett: Professional Services Manager appeared first on Fairdinkum.
By John Iacono July 21, 2025
As more businesses shift toward cloud-first operations, moving your company’s file systems from on-premise servers to a cloud platform like Microsoft SharePoint might seem like an obvious next step. But this type of migration is not a simple “drag and drop.” It requires strategic planning, technical alignment and user preparation to ensure the transition improves... The post Strategic Steps for a Seamless Cloud File System Migration appeared first on Fairdinkum.
Show More →