Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Don’t pay the Ransom!
    Cyber Security Awareness Month Tip

    Don’t pay the Ransom!

    By Gerald Johnson Jr.October 19, 2017Updated:November 24, 20202 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    If you find that your device has been compromised, and a cyber-criminal is demanding a ransom to release the files or access to your device, DON’T PAY IT.

    • Payment does not guarantee the return of your files.
      • Many cyber-criminals that use ransomware also have their version of helpdesks, which will work with victims to try to convince them to pay the ransom.
      • In some instances they will even release some of the files in a show of “good faith”, yet this alone will not ensure you will get all of your files released, or that they won’t demand more money.
    • Paying the ransom will basically fund their next attack.
      • Often times the amount the cyber-criminals are requesting doesn’t seem as high as expected, however this is because realistically if a home computer is compromised and the requested ransom is $300.00 it’s more likely the victim can and will pay.
      • Funds they receive are used to increase their reach and power.
      • Cyber-criminals rely on their scare tactics to try to get victims to pay.
      • Requesting immediate action gives the user the feeling that they have a limited amount of time to comply with request, or even that they have a limited amount of time to recover their files.
      • Keep in mind that as the cyber-criminals grow with technology, so does law enforcement.
    • If your device has been compromised contact Fordham IT.
      • Contact Fordham IT and provide them as much information as you can.
      • Fordham IT will work with public safety and local law enforcement to help you attempt to recover your files and protect you from future attacks.
    • Remember that prevention is the best medicine for all things cyber security.
      • Use antivirus
      • Keep your OS and Antivirus up to date
      • Run regular scans
      • Don’t open suspicious emails (unfamiliar senders, special offers, unexpected request)
      • Don’t download suspicious attachments

    Detailed information regarding passwords and other IT security topics are available on our IT Security website at: SecureIT.Fordham.edu or from our blog at itsecurity.blog.fordham.edu

    If you have any questions or concerns, please contact IT Customer Care at (718) 817-3999 or via email to: HelpIT@fordham.edu.

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleWhat is Malware?
    Next Article Additional steps to say protected.

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d