Password Protection and CryptoLocker (ransom) type trojans

My Book Duo 4TB Raid1

As CryptoLocker and similar (ransom) trojans encrypt and lock external USB drives, as well as internal ones, is there a way - other than to remove the USB drive (used for backup archiving only) when not used - to protect the My Book Duo?

For example, would the My Book Duo hardware password and/or 256-Bit AES encryption help?  Or would the ransom trojan encrypt the (encrypted/password-protected) drive regardless?  Any suggesions on how to keep the My Book Duo online - safely - at all times?


01/19/2015: Edited to reflect a more descriptive subject.

You should have a backup made of your device and stored offline so should the need arise you can fall back to your backup.

[You should have a backup made of your device and stored offline so should the need arise you can fall back to your backup.]

Device what?  And you are not addressing the issue(s) raised.  Other than that you are stating the obvious … except that for maximum security the backup should be offline-offsite and locked up in a bank safe…

Any other useful feedback on the specific questions raised?  Thanks.

This is a reply to myself as this community seems oblivious to the crypro-ransom threat.  Or, perhaps, my query was too simple/basic that the answer is know to all (except me).  :confounded:

Anyhow, this is what I have found:

I password protected my My Book Duo without checking the Enable Auto Unlock for user.  Once rebooted, or after a reconnect, the drive does NOT show up in Explorer and Disk Manager unless it’s unlocked.  Per Disk Manager, the drive is not initialized.  If I try to initialize, I get an error: The Media is Write Protected.  And, if not initialized, the way I see it, a crypto-ransom trojan variant or virus can’t do harm to same.

Awakening the computer from sleep/standby may be a different story, as the drive remains mounted (initialized) during this sequence, albeit fully password protected.  So, on  resume from sleep the drive is visible and accessible through the folder structure all the way down to a folder with protected files.  There I get a warning that the folder/files are password protected and not accessible.  Although I’m safe from snooping … I may not be safe against the crypto-ransom bad guys.

The safe way to go seems to be NOT to unlock/initialize the drive after a boot/reboot or after a drive connect/reconnect as per my earlier message.  If there is a WD guy ot there lurking, can you please confirm that the above is correct, or, if not, what your thoughts are.  Thanks.