Ransomware-What Everyone Should Know

Introduction 2
Types of Ransomware 2
How Does a Ransomware Attack Happen 2
Can you Prevent a Ransomware Attack 3
The following can help prevent a ransomware attack: 3
 Keep your operating system and virus protection updated. Cybercriminals look for and use flaws to gain access to your devices. 3
 Download only the applications you require on your computer or smart device. Delete applications you no longer use. 3
 Install a good malware program. Avoid ones that are free or that you don’t need to pay to use. 3
 Use two-factor authentication. 3
 If a link in an email is unfamiliar, do not click it. Also, a link may not be what it appears to be. Before you click on a link, hover over it to see the actual URL. Make sure the website you’re being directed to is spelled correctly, and that it le... 3
 Always be suspicious of emails that ask you for personal information, or that include links where you are asked to enter your credentials. For example, your bank should never instruct you to reset your password through an email link that requires yo... 3
 If an email is suspicious, check the return sender’s email address. For example, if you receive an email from SaskTel asking you to update your account information or to pay a bill, it is not likely that a SaskTel employee is going to send you an em... 3
 Cybercriminals usually like to make offers that seem too good to be true. These are designed to catch your attention, and may include claims that you’ve won a prize, etc. Remember the adage – if it’s too good to be true, it probably is! 3
 If you’re being asked to act fast, or if you’re asked to do something in a limited time, it may be a tactic. For example, you may be told that your Netflix account will be suspended if you don’t update your password within a specified amount of time... 3
 Have a plan to educate employees about ransomware attacks that includes what to do if one occurs. Review this plan with employees several times a year. 4
Social Engineering Red Flags and Suspicious Emails 4
How Should you Respond to a Ransomware Attack 4
More Information and Resources 5
Contact Information 6

RkJQdWJsaXNoZXIy MTgwMjYzOA==