Ransomware Rescue: How to Recognize and Avoid Data Hostage Situations
Threats seem innocent when they arrive looking like:
- Internet Downloads
… but one click can let an infection into your entire network.
Check all of your emails carefully before opening them.
Ransomware Safety Checklist:
- I know the sender of this email
- It makes sense that this was sent to me
- The attached file or link is something I can verify is safe
- The email doesn’t threaten to close my accounts or cancel my cards if I don’t provide information
- The email is from someone I trust, it just doesn’t look like someone I trust
- Nothing seems ‘off’ about this email, its contents or sender
To further protect yourself from ransomware …
Ransomware prevention list:
- Update, update, update your anti-virus and other applications.
- Stay Vigilant. If it sounds too good to be true, it is. Beware of ‘You’re a Winner” banners.
- Stick with trusted sites and be aware of email attachments: ransomware commonly comes in the form of a bogus shipping receipt
- Ensure your critical files are being back often and preferably offsite, in case you are infected.
- Listen to your anti-virus. If you get a warning from your anti-virus about a possible threat, do not dismiss it. Report it to your IT support.
- Watch out for popups. Immediate close popups that ask you to update you account information or install applications you did not specifically request.
- Bookmark your favourites. Hackers commonly create pages with names very close to commonly used sites. Save your most-used websites to avoid typing the wrong address and end up somewhere you don’t want to be.
If you think you’ve been infected, unplug your computer from the network (detach the network cable from your computer) and call your IT support immediately.
Source: Solarwinds N-able