Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Ransomware Awareness
    Cyber Security Awareness Month Tip

    Ransomware Awareness

    By Gregory RivasAugust 24, 2016Updated:October 4, 20163 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    What is Ransomware?

    According to the FBI, “Ransomware is a type of malicious software cyber actors use to deny access to systems or data.” Typically, the malicious actor will hold the system or data hostage via encryption using a private key that only they know. The only way for the victim to regain access to their system or data is to pay the ransom fee to the malicious actor. If the ransom is not paid, the data will remain unavailable or be deleted by the malicious actor or the ransomware itself. In addition, ransomware may spread to storage drives and other systems present on the network.

    How Does Ransomware Get Installed on a System?

    Ransomware can be installed on a system through the following means:

    • According to Symantec, “Ransomware is predominantly found on suspicious websites, and arrives either via a “drive-by download”, stealth download or through a user clicking on an infected advert. Some distribution via email has also been seen.”
    •  Remote installation via a software vulnerability.
    • Opening or clicking on a malicious attachment or link found in an email.

    Below is an example of CryptoLocker, a common ransomware variant.

    Crypto

    How Do I Protect Myself?

    Prevention is one of the best methods to defend against ransomware. Below are several steps you can take to prevent ransomware from being installed on your system:

    •  Ensure proper anti-virus and anti-malware software is installed on your machine and that it is updated regularly. Please note, Fordham offers free antivirus software to students and faculty here.
    • Ensure your Operating System and programs have received the most current updates. Attackers can easily exploit vulnerabilities in out-of-date software.
    • Regularly backup your computer and important files. This allows you to have a recovery option in place so your data is not lost forever. If using portable media, make sure the device is removed once the backup is complete.
    • Do not click on or open any suspicious links, pop-ups, or attachments. If you come across questionable or suspicious emails or websites, contact IT Customer Care immediately and allow the University Information Security Office (UISO) to validate the respective content.

    Paying a Ransomware Fee

    As per the FBI:

    “We do not encourage paying a ransom. We understand that when businesses are faced with an inability to function, executives will evaluate all options to protect their shareholders, employees, and customers. As you contemplate this choice, consider the following risks:

    • Paying a ransom does not guarantee an organization will regain access to their data; in fact, some individuals or organizations were never provided with decryption keys after having paid a ransom.
    • Some victims who paid the demand have reported being targeted again by cyber actors.
    • After paying the originally demanded ransom, some victims have been asked to pay more to get the promised decryption key.
    • Paying could inadvertently encourage this criminal business model.”

    Useful Links

    The FBI provides a more in-depth description of what ransomware is and what can be done to avoid becoming a victim.

    https://www.us-cert.gov/sites/default/files/publications/Ransomware_Executive_One-Pager_and_Technical_Document-FINAL.pdf

    The SANS Institute newsletter provides further information on ransomware and steps that can be taken to protect against it.

    http://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201608_en.pdf

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleArticle: Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks
    Next Article FYI – Phishing Email Sent to the Fordham Community on 08/24/2016

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d