Settings
Language
Color Theme
What is ransomware?
Ransomware is like a digital kidnapper, holding your computer hostage until you pay up! It's software that encrypts all your data and demands a ransom from you to decrypt it.
What is ransomware?
Ransomware is a type of malicious software that is designed to block access to data until a sum of money is paid. Ransomware attacks typically involve the attacker encrypting the victim's data and demanding a ransom from the victim to restore access.
View Options Again
A type of software that helps to improve computer performance
A type of software that helps to recover lost data
A type of software that encrypts data and holds the encryption key at ransom
A type of antivirus software
Why should we care about ransomware?
It's important to protect against ransomware attacks because they can result in data loss, significant disruptions and costs for individuals and organisations. Ransomware attacks involve the attacker encrypting the victim's data and demanding a ransom to restore access.
View Options Again
Ransomware can cause data loss of access to important data
Ransomware can result in a disruption to day-to-day operations
All options are correct.
Ransomware can result in financial and reputational damage to an organization
Curious how cyber criminals spread ransomware?
Cyber criminals often use a combination of social engineering (i.e. manipulation) and exploitation of computer system vulnerabilities to deliver ransomware.
Email attachments
Malicious websites
Exploit kits
Cyber criminals may spread ransomware through email attachments. They may send emails that contain malicious attachments, which, when downloaded and opened, will install the ransomware on the victim's computer. This delivery method relies on social engineering.
Cyber criminals may spread ransomware by directing victims to malicious websites. When the victim visits the website, the ransomware may be automatically downloaded and installed on their computer. This delivery method relies on social engineering.
Cyber criminals may use exploit kits to spread ransomware. Exploit kits are sets of tools that are used to exploit vulnerabilities in computer systems and install malware, including ransomware. Exploit kits are often designed for mass exploitation and it allows criminals to scale their operations significantly.
Is the following statement True or False:
You should only download attachments in an email if the email is expected and from a trusted sender.
It's ok to download an attachment in an email if the email is expected and from a trusted sender. If the email raises any red flags such as it's unsolicited, calls for urgency, is from an unknown sender or contains suspicious wording or grammar, then you should report the email to your IT or Security team as a suspected phish.
View Options Again
True
False
What does ransomware do once it infects a computer?
It begins encrypting data on the infected computer. Once encrypted, ransomware will display a message demanding payment in the form of virtual currency (e.g. Bitcoin) in exchange for the decryption key.
What does ransomware do to data on your computer?
Ransomware encrypts data, which means it converts the data into a form that is unreadable without a decryption key.
View Options Again
It moves it to a safe location
It secures data through encryption
It deletes data
It makes data unreadable
Preventing ransomware
Ensuring you're protected against ransomware requires you to implement a variety of cyber security best practices. As a starting point, it's best to follow the three practices listed below.
Keep systems and software up-to-date
Regularly back up data
Avoid suspicious emails and websites
One of the most effective ways to protect against ransomware is to ensure that all systems and software are kept up-to-date. This includes installing updates and patches as they become available, as these can fix vulnerabilities that can be exploited by ransomware.
Regularly backing up data is another important way to protect against ransomware. By regularly creating copies of important data, you can ensure that you have a copy available in case your data is encrypted by ransomware.
Cyber criminals often spread ransomware through email attachments and malicious websites. It is important to be cautious of suspicious emails and websites and to avoid opening attachments or clicking links from unknown sources. Instead, verify the authenticity of emails and websites before interacting with them.
Is the following statement True or False:
To prevent ransomware, we should store data in the cloud and make it publicly readable and writable.
Making data publicly readable and writable invites cyber criminals to encrypt the data and hold it for ransom. To prevent ransomware, data should be stored in a secure location, with backups stored in a separate location.
View Options Again
True
False
To prevent ransomware, we should
To deter ransomware attacks we should, be cautious of suspicious emails and websites, perform frequent backups and perform frequent software and system updates.
View Options Again
No option is correct.
Perform infrequent software and system updates
Remain cautious of suspicious emails and websites
Perform infrequent backups
Ransomware recovery
Before restoring systems from a backup device, it's good practice to ensure that the cyber criminal no longer has access to your network. This is to ensure that they can't just re-encrypt restored data!
Why should we ensure cyber criminals no longer have access to our network before restoring data?
The main reason we want to ensure cyber criminals no longer have access to our networks when restoring from a ransomware attack is because they'll re-encrypt any restored data. The restoration of data may also prompt them to take further action to disrupt and destroy IT systems as it's an indicator that they likely won't be receiving their ransomware payment.
View Options Again
Because they'll just re-encrypt any restored data
Because they're not an employee and shouldn't have access
Because they might see our sensitive data
Because we don't want them to know we're onto them
Why is ransomware growing?
Since the introduction of digital currencies such as Bitcoin, ransomware has exponentially grown in popularity. This is because cyber criminals now have a mechanism to anonymously accept funds from their illicit activities.
Wrapping up
If you open an email, visit a website, come across a file that seems suspicious or believe that your computer is infected with malware, don't hesitate to contact your IT or Security team for assistance.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Ransomware
[88, "Ransomware", "Ransomware"],
What is ransomware?
[89, "What is ransomware?", "What is ransomware?"],
Ransomware is like a digital kidnapper, holding your computer hostage until you pay up! It's software that encrypts all your data and demands a ransom from you to decrypt it.
[90, "Ransomware is like a digital kidnapper, holding your computer hostage until you pay up! It's software that encrypts all your data and demands a ransom from you to decrypt it.", "Ransomware is like a digital kidnapper, holding your computer hostage until you pay up! It's software that encrypts all your data and demands a ransom from you to decrypt it."],
What is ransomware?
[91, "What is ransomware?", "What is ransomware?"],
A type of antivirus software
[92, "A type of antivirus software", "A type of antivirus software"],
A type of software that helps to recover lost data
[93, "A type of software that helps to recover lost data", "A type of software that helps to recover lost data"],
A type of software that helps to improve computer performance
[94, "A type of software that helps to improve computer performance", "A type of software that helps to improve computer performance"],
A type of software that encrypts data and holds the encryption key at ransom
[95, "A type of software that encrypts data and holds the encryption key at ransom", "A type of software that encrypts data and holds the encryption key at ransom"],
Ransomware is a type of malicious software that is designed to block access to data until a sum of money is paid. Ransomware attacks typically involve the attacker encrypting the victim's data and demanding a ransom from the victim to restore access.
[96, "Ransomware is a type of malicious software that is designed to block access to data until a sum of money is paid. Ransomware attacks typically involve the attacker encrypting the victim's data and demanding a ransom from the victim to restore access.", "Ransomware is a type of malicious software that is designed to block access to data until a sum of money is paid. Ransomware attacks typically involve the attacker encrypting the victim's data and demanding a ransom from the victim to restore access."],
Why should we care about ransomware?
[97, "Why should we care about ransomware?", "Why should we care about ransomware?"],
Ransomware can result in a disruption to day-to-day operations
[98, "Ransomware can result in a disruption to day-to-day operations", "Ransomware can result in a disruption to day-to-day operations"],
Ransomware can cause data loss of access to important data
[99, "Ransomware can cause data loss of access to important data", "Ransomware can cause data loss of access to important data"],
Ransomware can result in financial and reputational damage to an organization
[100, "Ransomware can result in financial and reputational damage to an organization", "Ransomware can result in financial and reputational damage to an organization"],
All options are correct.
[101, "All options are correct.", "All options are correct."],
It's important to protect against ransomware attacks because they can result in data loss, significant disruptions and costs for individuals and organisations. Ransomware attacks involve the attacker encrypting the victim's data and demanding a ransom to restore access.
[102, "It's important to protect against ransomware attacks because they can result in data loss, significant disruptions and costs for individuals and organisations. Ransomware attacks involve the attacker encrypting the victim's data and demanding a ransom to restore access.", "It's important to protect against ransomware attacks because they can result in data loss, significant disruptions and costs for individuals and organisations. Ransomware attacks involve the attacker encrypting the victim's data and demanding a ransom to restore access."],
Curious how cyber criminals spread ransomware?
[103, "Curious how cyber criminals spread ransomware?", "Curious how cyber criminals spread ransomware?"],
Cyber criminals often use a combination of social engineering (i.e. manipulation) and exploitation of computer system vulnerabilities to deliver ransomware.
[104, "Cyber criminals often use a combination of social engineering (i.e. manipulation) and exploitation of computer system vulnerabilities to deliver ransomware.", "Cyber criminals often use a combination of social engineering (i.e. manipulation) and exploitation of computer system vulnerabilities to deliver ransomware."],
Email attachments
[105, "Email attachments", "Email attachments"],
Cyber criminals may spread ransomware through email attachments. They may send emails that contain malicious attachments, which, when downloaded and opened, will install the ransomware on the victim's computer. This delivery method relies on social engineering.
[106, " Cyber criminals may spread ransomware through email attachments. They may send emails that contain malicious attachments, which, when downloaded and opened, will install the ransomware on the victim's computer. This delivery method relies on social engineering.", " Cyber criminals may spread ransomware through email attachments. They may send emails that contain malicious attachments, which, when downloaded and opened, will install the ransomware on the victim's computer. This delivery method relies on social engineering."],
Malicious websites
[107, "Malicious websites", "Malicious websites"],
Cyber criminals may spread ransomware by directing victims to malicious websites. When the victim visits the website, the ransomware may be automatically downloaded and installed on their computer. This delivery method relies on social engineering.
[108, "Cyber criminals may spread ransomware by directing victims to malicious websites. When the victim visits the website, the ransomware may be automatically downloaded and installed on their computer. This delivery method relies on social engineering.", "Cyber criminals may spread ransomware by directing victims to malicious websites. When the victim visits the website, the ransomware may be automatically downloaded and installed on their computer. This delivery method relies on social engineering."],
Exploit kits
[109, "Exploit kits", "Exploit kits"],
Cyber criminals may use exploit kits to spread ransomware. Exploit kits are sets of tools that are used to exploit vulnerabilities in computer systems and install malware, including ransomware. Exploit kits are often designed for mass exploitation and it allows criminals to scale their operations significantly.
[110, "Cyber criminals may use exploit kits to spread ransomware. Exploit kits are sets of tools that are used to exploit vulnerabilities in computer systems and install malware, including ransomware. Exploit kits are often designed for mass exploitation and it allows criminals to scale their operations significantly.", "Cyber criminals may use exploit kits to spread ransomware. Exploit kits are sets of tools that are used to exploit vulnerabilities in computer systems and install malware, including ransomware. Exploit kits are often designed for mass exploitation and it allows criminals to scale their operations significantly."],
You should only download attachments in an email if the email is expected and from a trusted sender.
[111, "You should only download attachments in an email if the email is expected and from a trusted sender.", "You should only download attachments in an email if the email is expected and from a trusted sender."],
It's ok to download an attachment in an email if the email is expected and from a trusted sender. If the email raises any red flags such as it's unsolicited, calls for urgency, is from an unknown sender or contains suspicious wording or grammar, then you should report the email to your IT or Security team as a suspected phish.
[112, "It's ok to download an attachment in an email if the email is expected and from a trusted sender. If the email raises any red flags such as it's unsolicited, calls for urgency, is from an unknown sender or contains suspicious wording or grammar, then you should report the email to your IT or Security team as a suspected phish.", "It's ok to download an attachment in an email if the email is expected and from a trusted sender. If the email raises any red flags such as it's unsolicited, calls for urgency, is from an unknown sender or contains suspicious wording or grammar, then you should report the email to your IT or Security team as a suspected phish."],
What does ransomware do once it infects a computer?
[113, "What does ransomware do once it infects a computer?", "What does ransomware do once it infects a computer?"],
It begins encrypting data on the infected computer. Once encrypted, ransomware will display a message demanding payment in the form of virtual currency (e.g. Bitcoin) in exchange for the decryption key.
[114, "It begins encrypting data on the infected computer. Once encrypted, ransomware will display a message demanding payment in the form of virtual currency (e.g. Bitcoin) in exchange for the decryption key.", "It begins encrypting data on the infected computer. Once encrypted, ransomware will display a message demanding payment in the form of virtual currency (e.g. Bitcoin) in exchange for the decryption key."],
What does ransomware do to data on your computer?
[115, "What does ransomware do to data on your computer?", "What does ransomware do to data on your computer?"],
It makes data unreadable
[116, "It makes data unreadable", "It makes data unreadable"],
It deletes data
[117, "It deletes data", "It deletes data"],
It secures data through encryption
[118, "It secures data through encryption", "It secures data through encryption"],
It moves it to a safe location
[119, "It moves it to a safe location", "It moves it to a safe location"],
Ransomware encrypts data, which means it converts the data into a form that is unreadable without a decryption key.
[120, "Ransomware encrypts data, which means it converts the data into a form that is unreadable without a decryption key.", "Ransomware encrypts data, which means it converts the data into a form that is unreadable without a decryption key."],
Preventing ransomware
[121, "Preventing ransomware", "Preventing ransomware"],
Ensuring you're protected against ransomware requires you to implement a variety of cyber security best practices. As a starting point, it's best to follow the three practices listed below.
[122, "Ensuring you're protected against ransomware requires you to implement a variety of cyber security best practices. As a starting point, it's best to follow the three practices listed below.", "Ensuring you're protected against ransomware requires you to implement a variety of cyber security best practices. As a starting point, it's best to follow the three practices listed below."],
Keep systems and software up-to-date
[123, "Keep systems and software up-to-date", "Keep systems and software up-to-date"],
One of the most effective ways to protect against ransomware is to ensure that all systems and software are kept up-to-date. This includes installing updates and patches as they become available, as these can fix vulnerabilities that can be exploited by ransomware.
[124, "One of the most effective ways to protect against ransomware is to ensure that all systems and software are kept up-to-date. This includes installing updates and patches as they become available, as these can fix vulnerabilities that can be exploited by ransomware.", "One of the most effective ways to protect against ransomware is to ensure that all systems and software are kept up-to-date. This includes installing updates and patches as they become available, as these can fix vulnerabilities that can be exploited by ransomware."],
Regularly back up data
[125, "Regularly back up data", "Regularly back up data"],
Regularly backing up data is another important way to protect against ransomware. By regularly creating copies of important data, you can ensure that you have a copy available in case your data is encrypted by ransomware.
[126, "Regularly backing up data is another important way to protect against ransomware. By regularly creating copies of important data, you can ensure that you have a copy available in case your data is encrypted by ransomware.", "Regularly backing up data is another important way to protect against ransomware. By regularly creating copies of important data, you can ensure that you have a copy available in case your data is encrypted by ransomware."],
Avoid suspicious emails and websites
[127, "Avoid suspicious emails and websites", "Avoid suspicious emails and websites"],
Cyber criminals often spread ransomware through email attachments and malicious websites. It is important to be cautious of suspicious emails and websites and to avoid opening attachments or clicking links from unknown sources. Instead, verify the authenticity of emails and websites before interacting with them.
[128, "Cyber criminals often spread ransomware through email attachments and malicious websites. It is important to be cautious of suspicious emails and websites and to avoid opening attachments or clicking links from unknown sources. Instead, verify the authenticity of emails and websites before interacting with them.", "Cyber criminals often spread ransomware through email attachments and malicious websites. It is important to be cautious of suspicious emails and websites and to avoid opening attachments or clicking links from unknown sources. Instead, verify the authenticity of emails and websites before interacting with them."],
To prevent ransomware, we should store data in the cloud and make it publicly readable and writable.
[129, "To prevent ransomware, we should store data in the cloud and make it publicly readable and writable.", "To prevent ransomware, we should store data in the cloud and make it publicly readable and writable."],
Making data publicly readable and writable invites cyber criminals to encrypt the data and hold it for ransom. To prevent ransomware, data should be stored in a secure location, with backups stored in a separate location.
[130, "Making data publicly readable and writable invites cyber criminals to encrypt the data and hold it for ransom. To prevent ransomware, data should be stored in a secure location, with backups stored in a separate location.", "Making data publicly readable and writable invites cyber criminals to encrypt the data and hold it for ransom. To prevent ransomware, data should be stored in a secure location, with backups stored in a separate location."],
To prevent ransomware, we should
[131, "To prevent ransomware, we should", "To prevent ransomware, we should"],
Perform infrequent backups
[132, "Perform infrequent backups", "Perform infrequent backups"],
Remain cautious of suspicious emails and websites
[133, "Remain cautious of suspicious emails and websites", "Remain cautious of suspicious emails and websites"],
Perform infrequent software and system updates
[134, "Perform infrequent software and system updates", "Perform infrequent software and system updates"],
No option is correct.
[135, "No option is correct.", "No option is correct."],
To deter ransomware attacks we should, be cautious of suspicious emails and websites, perform frequent backups and perform frequent software and system updates.
[136, "To deter ransomware attacks we should, be cautious of suspicious emails and websites, perform frequent backups and perform frequent software and system updates.", "To deter ransomware attacks we should, be cautious of suspicious emails and websites, perform frequent backups and perform frequent software and system updates."],
Ransomware recovery
[137, "Ransomware recovery", "Ransomware recovery"],
Before restoring systems from a backup device, it's good practice to ensure that the cyber criminal no longer has access to your network. This is to ensure that they can't just re-encrypt restored data!
[138, "Before restoring systems from a backup device, it's good practice to ensure that the cyber criminal no longer has access to your network. This is to ensure that they can't just re-encrypt restored data!", "Before restoring systems from a backup device, it's good practice to ensure that the cyber criminal no longer has access to your network. This is to ensure that they can't just re-encrypt restored data!"],
Why should we ensure cyber criminals no longer have access to our network before restoring data?
[139, "Why should we ensure cyber criminals no longer have access to our network before restoring data?", "Why should we ensure cyber criminals no longer have access to our network before restoring data?"],
Because they'll just re-encrypt any restored data
[140, "Because they'll just re-encrypt any restored data", "Because they'll just re-encrypt any restored data"],
Because we don't want them to know we're onto them
[141, "Because we don't want them to know we're onto them", "Because we don't want them to know we're onto them"],
Because they might see our sensitive data
[142, "Because they might see our sensitive data", "Because they might see our sensitive data"],
Because they're not an employee and shouldn't have access
[143, "Because they're not an employee and shouldn't have access", "Because they're not an employee and shouldn't have access"],
The main reason we want to ensure cyber criminals no longer have access to our networks when restoring from a ransomware attack is because they'll re-encrypt any restored data. The restoration of data may also prompt them to take further action to disrupt and destroy IT systems as it's an indicator that they likely won't be receiving their ransomware payment.
[144, "The main reason we want to ensure cyber criminals no longer have access to our networks when restoring from a ransomware attack is because they'll re-encrypt any restored data. The restoration of data may also prompt them to take further action to disrupt and destroy IT systems as it's an indicator that they likely won't be receiving their ransomware payment.", "The main reason we want to ensure cyber criminals no longer have access to our networks when restoring from a ransomware attack is because they'll re-encrypt any restored data. The restoration of data may also prompt them to take further action to disrupt and destroy IT systems as it's an indicator that they likely won't be receiving their ransomware payment."],
Why is ransomware growing?
[145, "Why is ransomware growing?", "Why is ransomware growing?"],
Since the introduction of digital currencies such as Bitcoin, ransomware has exponentially grown in popularity. This is because cyber criminals now have a mechanism to anonymously accept funds from their illicit activities.
[146, "Since the introduction of digital currencies such as Bitcoin, ransomware has exponentially grown in popularity. This is because cyber criminals now have a mechanism to anonymously accept funds from their illicit activities.", "Since the introduction of digital currencies such as Bitcoin, ransomware has exponentially grown in popularity. This is because cyber criminals now have a mechanism to anonymously accept funds from their illicit activities."],
Wrapping up
[147, "Wrapping up", "Wrapping up"],
If you open an email, visit a website, come across a file that seems suspicious or believe that your computer is infected with malware, don't hesitate to contact your IT or Security team for assistance.
[148, "If you open an email, visit a website, come across a file that seems suspicious or believe that your computer is infected with malware, don't hesitate to contact your IT or Security team for assistance.", "If you open an email, visit a website, come across a file that seems suspicious or believe that your computer is infected with malware, don't hesitate to contact your IT or Security team for assistance."],
[149, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.