What is ransomware?
Ransomware attack: Are you prepared?
Let’s take a look at how a system can be attacked through phishing or spam.
- Sending scam or phishing messages within the application and to personal and/or professional email accounts
- Collecting information for use in future phishing campaigns
- Collecting information on company technologies, proprietary information and projects
- Connecting with multiple, legitimate contacts in order to increase the perceived legitimacy of the fraudulent profile.
- Regularly verify connections and contacts on social media accounts
- Limit personal and professional information posted online
- Change passwords regularly, and do not reuse passwords
- Enable two-factor authentication where available
- Don’t provide sensitive information via social media, even in private messages.
- Report suspicious messages
- Verify the legitimacy of emails using trusted contact information before taking an action requested in an unexpected or unsolicited email
- Install anti-virus on all computers.
- Ensure anti-virus is up to date and complete a virus scan
- Do not click on links or open attachments in suspicious emails
- Report suspicious emails
- Do not visit unfamiliar or suspicious websites and links.
One more thing: Ensure you have a crisis communication plan in place as well as having a plan on how to deal with the actual attack.