Showing posts with label ransomware. Show all posts
Showing posts with label ransomware. Show all posts

Tuesday, February 23, 2021

What is Ransomware & How Can You Protect Yourself From It?

Ransomware is a class of malware that prevents you from accessing your systems or data and demands a sum of money to be paid in return for the decryption key. This has resulted in billions of dollars in losses with over 2 million incidents reported in 2019. These kinds of cyberattacks are getting more complex and are holding organizations hostage until they pay millions in ransom. Ransomware attacks have a new target every 14 seconds and have the ability to shutdown digital operations, steal information, and exploit businesses, essential services, and individuals. 


Below are precautions to protect you against the threat of ransomware:
  • Update software and operating systems. Outdated applications and operating systems are the target of most attacks.

  • Never click on links or open attachments in unsolicited emails.

  • Backup data on a regular basis. Keep it on a separate device and store it offline.

  • Restrict permissions to install and run software applications.

  • Enable strong spam filters to prevent phishing emails from reaching you and authenticate inbound email to prevent email spoofing.

  • Scan all incoming and outgoing emails to detect threats.

  • Configure firewalls to block access to known malicious IP addresses.

For more information on Ransomware and how to defend against it please check out these articles: 

Thursday, September 20, 2018

Do You Have a Personal Backup Plan?

Most of us would like to say that we are extremely diligent about protecting our data and backing it up on a regular basis. However, we know that this is not always the case. 

Fortunately, backups are easier than ever before thanks to a plethora of options available to most end users. It is critical to create a backup plan for important files and make sure those backups are stored in a separate location (physically or in the cloud) so you can avoid losing valuable information if your computer is lost, stolen, compromised, or simply fails to turn on one day. 

When it comes to backups, just like security, you want to find a balance of being thorough but efficient. We have all heard disastrous stories of losing homework due to the blue screen of death or a misplaced cell phone that tragically stored the only copy of family photos. In addition, you could fall victim to ransomware or another malicious attack that leaves you with no choice but to reinstall your computer's operating system (OS). It never hurts to consider your backup strategy and come up with a plan that leaves you feeling safe and secure. Here are some tips to get you started.
  • Data loss happens all the time, but it is entirely preventable. You just need to create a backup plan.
  • Your critical data should never reside in a single place.
  • The ideal backup strategy will typically include both an online backup service (Google Drive) to ensure your data is secure no matter what happens to your mobile device or computer.
  • Running consistent, automatic backups is a straightforward process that will take little time to set up and will require even less to maintain.
  • Backups can be configured to run in real time when files on your computer are changed.
  • Routinely test your backup solution to ensure you can recover your data in the event that you do actually need to restore from a backup.
Manhattan College IT Services provides unlimited cloud storage with your JasperNet credentials to faculty, staff and students so you can back up your files. If you upload your files to Google Drive you can access them from anywhere. IT Services recommends Google Drive File Stream for storage and back up of files.



Sleepwalking is the only thing you should be worried about. #lockdownURlogin Lock Down Your Login
Source: STOP. THINK. CONNECT. 
Partially reposted from September 2018: Do You Have a Personal Backup Plan?

Monday, September 18, 2017

Avoiding Ransomware Attacks

Ransomware is a type of malware designed to encrypt users’ files or lock their operating systems so attackers can demand a ransom payment. According to a 2016 Symantec reportthe average ransom demand is almost $700 and “consumers are the most likely victims of ransomware, accounting for 57 percent of all infections between January 2015 and April 2016.”
Similar to a phishing attack, ransomware executes when a user is lured to click on an infected link or e-mail attachment or to download a file or software drive while visiting a rogue website. Sophisticated social engineering techniques are used to entice users to take the desired action; examples include
  • an embedded malicious link in an e-mail offers a cheap airfare ticket (see figure 1);
  • an e-mail that appears to be from Google Chrome or Facebook invites recipients to click on an image to update their web browser (see figure 2); or
  • a well-crafted website mimics a legitimate website and prompts users to download a file or install an update that locks their PC or laptop.



Figure 1. Phishing e-mail with ransomware embedded in a link
Figure 1. Phishing e-mail with ransomware embedded in a link
Figure 2. A fake Google Chrome e-mail
Figure 2. A fake Google Chrome e-mail

To avoid becoming a victim of ransomware, users can follow these tips:
  • Delete any suspicious e-mail. Messages from unverified sources or from known sources that offer deals that sound too good to be true are most likely malicious (see figure 3). If in doubt, contact the alleged source by phone or by using a known, public e-mail address to verify the message’s authenticity.
  • Avoid clicking on unverified e-mail links or attachments. Suspicious links might carry ransomware (such as the CryptoLocker Trojan).
  • Use e-mail filtering options whenever possible. E-mail or spam filtering can stop a malicious message from reaching your inbox.
  • Install and maintain up-to-date antivirus software. Keeping your operating system updated with the latest virus definitions will ensure that your security software can detect the latest malware variations.
  • Update all devices, software, and plug-ins on a regular basis. Check for operating system, software, and plug-in updates often — or, if possible, set up automatic updates — to minimize the likelihood of someone holding your computer or files for ransom.
  • Back up your files. Back up the files on your computer, laptop, or mobile devices frequently so you don’t have to pay the ransom to access locked files.



Figure 3. An example ransomware e-mail message
Figure 3. An example ransomware e-mail message

Wednesday, May 17, 2017

Solution for latest RansomWare Attack (WannaCry)

The latest RansomWare attack known as WannaCry impacts Windows machines that are not up to date. 
To prevent your personal Windows machine from getting impacted, please turn off the Windows feature named:
SMB 1.0/CIFS FILE SHARING SUPPORT

1. Click on the Search option and search for "Windows Features" and you will see the result as "Turn Windows Feature on or off"
2. Upon clicking the option, the following screen will be prompted:




3. Untick the box and click "OK"

Please Note:  TURNING THIS FEATURE OFF WILL MAKE YOUR COMPUTER RESTART.

To avoid this virus the best practice would be to follow these instructions for Manhattan College Windows PC's and personal Windows PC's.


Saturday, May 13, 2017

Ransomware Alert - How to Stay Safe

A major ransomware cyber attack has been moving through european countries overnight.  The attack spreads through a combination of phishing and vulnerable unpatched Windows systems.

A number of protections are already in place for important JasperNet services such as Moodle and Self-Service, however, it's important to be vigilant when receiving suspicious or unsolicited messages.  While the spread of the attack has slowed, there is an expectation that the same or similar attack will eventually resume.

What is Ransomware?
In a nutshell, ransomware is a cyber attack that "locks" files on your computer (using encryption) and extorts a ransom payment from the victim to the attacker to unlock (unencrypt) the files.

To read more about this cyber attack, see the link below to Google News:
https://news.google.com/news/section?cf=all&hl=en&pz=1&ned=us&q=Ransomware&ict=clu_top