My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
9.1 SR 07-20-2020
ElkRiver
>
City Government
>
City Council
>
Council Agenda Packets
>
2011 - 2020
>
2020
>
07-20-2020
>
9.1 SR 07-20-2020
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/23/2020 3:49:08 PM
Creation date
7/16/2020 9:42:17 AM
Metadata
Fields
Template:
City Government
type
SR
date
7/20/2020
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
24
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />Ransomware is one of the fastest growing malware threats today, a new organization will fall victim to <br />ransomware every 14 seconds in 2019, every 11 seconds by 2021. It is easy to see that ransomware has <br />the potential to be a major financial burden for any targeted organization. An estimate of the cost of <br />ramsomware attacks in 2019 is in excess of $7.5 billion. <br />Ransomware: is a form of malware that targets your critical data and systems for the purpose of <br />extortion. It encrypts personal files and folders (documents, spread sheets, pictures, and videos). The <br />affected files are deleted once they have been encrypted, and users generally encounter a text file with <br />instructions for payment in the same folder as the now-inaccessible files.You may discover the problem <br />only when you attempt to open one of these files. Some, but not all types of encryption software show <br />a ‘lock screen’. <br />A ransomware attack is typically delivered via an e-mail attachment. Once the attachment is opened, <br />the malware is released into the user’s system and can spread through the network. Cybercriminals can <br />also plant the malware on websites. When a user visits the site unknowingly, the malware is released <br />into the system. <br /> <br />How ramsomeware works. <br />Paying the ransom is never recommended, there is no guarantee that this is a solution to the problem. <br />If the ransom is paid the attacker may or may not provide the decryption key, plus there is no guarantee <br />that the attacker hasn’t already installed other malware to extort more payments from your <br />organization in the future. <br />Dealing with a ransomware attack <br />1. Unplug infected computers from the network. This will prevent the infection from spreading to <br />other computers and causing more damage. <br />2. Disable the ransomware process by stopping the ransomware executables from running. <br />3. Identify the type of ransomware running by uploading the ransom note or one of the encrypted <br />files to https://www.nomoreransom.org/crypto-sheriff.php?lang=en . This website was created <br />by law enforcement and IT Security companies that have joined forces to disrupt cybercriminal <br />businesses with ransomware connections. <br /> <br /> <br /> <br />
The URL can be used to link to this page
Your browser does not support the video tag.