Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»What is Ransomware?
    Cyber Security Awareness Month Tip

    What is Ransomware?

    By Sabina PerezOctober 20, 20212 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Ransomware is a form of malware used against your device. Once cybercriminals gain access to your information, they encrypt your files making them inoperable. Malicious actors will try to pressure you into paying a ransom in exchange for your data. They can threaten to release or sell your information to others if the ransom is not paid. 

    Ransomware is quite dangerous and can appear anywhere throughout the internet. In order for cybercriminals to infect your device with ransomware they must infiltrate it first. The malicious act has gained popularity as it has become increasingly easier to pervade devices. Users should be cautious before interacting with suspicious activity and should verify links or attachments before opening them.  

    Common attacks to look out for include but are not limited to:

    • Phishing Campaigns
      • This appears in emails and include malicious links or images that can compromise your device if clicked or opened. Double-check the sender’s email address for familiarity and report suspicious emails to IT. 
    • Remote Desktop Protocol
      • RDP(Remote Desktop Protocol) is the ability to connect to a computer over a network connection. RDP can be very harmful if users give access to malicious actors or connect to unsecured networks. Make sure you only connect your devices to trusted networks. 
    • Software Vulnerabilities
      • Devices can become more vulnerable if software is not up to date. This is why it is important for users to remember to check for updates or enable automatic updates.

     

    If you suspect you have been infected with ransomware contact IT Customer Care immediately at (718) 817-3999 or via email to: HelpIT@fordham.edu

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleBe Wary of Tech Support Scams, From Cold Calls to Web Browser Pop-ups
    Next Article How To Avoid Being Hit With Ransomware

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d