protect NAS shared folder against cryptolocker attack

by EttoreP   Last Updated January 13, 2018 21:00 PM

I got a NAS with some shared folders, for access it a user/pass authentication is needed. My question is about how a malicious software (expecially a cryptolocker) can access to the network folder depending on how i open it.
For example...if i "mount" the network shared folder using "connect network resource" in, let's say, x:\ saving user/pass so the user don't need to insert them every time, when i boot the pc i find x:\ and i can access it, and i guess that the virus can do the same...right?
If instead i only make a directory link that points to the shared folder, and i must insert user/pass when i open it, what happens? When i start the pc the directory is not accessible until when i insert the user/pass for open it, so obviously the virus can't access it...but after i open the folder and i provide user/pass i can access the folder, but the virus? Can it "find" the folder and crypt the files inside it even if the folder have not an address like x:\ or c:\something\somethingelse?

Related Questions

iSCSI NAS vs DAS - Please ID10T check me

Updated August 19, 2018 05:00 AM

DAS or NAS for Microsoft NAV, File Sharing and AD

Updated October 06, 2015 14:00 PM

Collaborative document using NAS or SAN

Updated February 22, 2016 03:00 AM