Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»What is Ransomware?
    Cyber Security Awareness Month Tip

    What is Ransomware?

    By Gerald Johnson Jr.October 16, 2017Updated:November 24, 20202 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Ransomware is malicious software that is installed onto your device once it is compromised, that will both take over important files on the device, or the entire device, and request a ransom be paid for the user to regain access. While ransomware isn’t new to the cyber criminals resume, other advances in technology have made it easier to request and receive untraceable payments. Making ransomware a very attractive option for cyber criminals.

    • Don’t pay the Ransom!
      • If you receive a message on your device indicating that you have been compromised, DISCONNECT your device from the internet so the malicious software isn’t spread.
      • Contact Fordham IT and provide them as much information as you can.
      • Fordham IT will work with public safety and local law enforcement to help you attempt to recover your files and protect you from future attacks.
      • There may be ways without paying to recover the files that are being ransomed.
    • BACK UP ALL YOUR IMPORTANT FILES.
    • Ransomware is banking on you desperately needing the files they’ve attacked, keeping your files backed up in different locations can reduce the effectiveness of this type of attack on your device.
      • Use an external hard drive these have recently become more affordable, and portable.
      • Fordham students and employees have access to unlimited storage on Google Drive, this can be used to help free up space on your device.
      • For important files backing up on an external device and using encryption would be ideal.
    • Prevention is the best medicine.
      • Keep your devices and OS up to date.
        • Microsoft had sent out a patch that would have protected users from the “WannaCry” Ransomware 8 weeks before many users were hit. Simple and regular updates can keep you safe.
          • For more on this story visit: https://www.nytimes.com/2017/05/15/technology/personaltech/heres-how-to-protect-yourself-from-ransomware-attacks.html?mcubz=0
        • Use antivirus. Many providers are in the know, and the software will know what to look for.
          • It’s important to keep this software up to date as well and to run scans regularly.

    Detailed information regarding passwords and other IT security topics are available on our IT Security website at: SecureIT.Fordham.edu or from our blog at itsecurity.blog.fordham.edu

    If you have any questions or concerns, please contact IT Customer Care at (718) 817-3999 or via email to: HelpIT@fordham.edu.fyhu

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleBeware of This Apple iPhone Password Phishing Scam
    Next Article Keep antivirus protection up to date. Get your free Antivirus software from Fordham University.

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d