Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.

Slides:



Advertisements
Similar presentations
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
HNA-Drive Familiarization Presentation. From the address bar in your preferred internet browser, navigate to Site supports: Internet.
Computer Viruses.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Quiz Review.
SHARESYNCPage 1 of 2 ShareSync is a business-grade file sync and share service Sync files across devices Share files and folders easily and securely Business-grade.
Threats to I.T Internet security By Cameron Mundy.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Video Following is a video of what can happen if you don’t update your security settings! security.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
IT for Brownies. hackers What they do b They illegally get into your computer and access anything on your computer. b Mr Gary Mckinnon got caught trying.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Phillip Dinh, Fofanova, 1301, UH Internet Security By Phillip Dinh 1301 Spring 2007 University of Houston.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
INTERNET SAFETY FOR KIDS
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
What is Spam? d min.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Cyber Safety Jamie Salazar.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Writing an message Finish off your slide on recommendations of how to write an .
Operating systems What is an operating system? A program that: Controls hardware Controls software Creates an interface between the hardware and the user.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
For more information on Rouge, visit:
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Chapter 6 Protecting Your Files
What they are and how to protect against them
Cyber Security Awareness Workshop
Staying Austin College
4 ways to stay safe online 1. Avoid viruses and phishing scams
Top Ten Cyber Security Hygiene Tips
9 ways to avoid viruses and spyware
IT Training.
Cybersecurity Simplified: Ransomware
Presentation transcript:

Ransomware BISD Technology Department

Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and restricts access or locks down the device until a ransom is paid. Ransomware infections have seen exponential growth in 2016 with hackers using craftier methods to attack unsuspecting users.

Ransomware Not only can ransomware encrypt the files on your computer, the software is smart enough to travel across the network and encrypt any files located on shared network drives. This can lead to a catastrophic situation where one infected user can bring an entire company (or school district) to a halt!

How bad can it be? Photos Music Videos Documents Financial Health Teaching/department Documents

What Operating Systems Can Ransomware Affect?

“The adage is true that the security systems have to win every time, the attacker only has to win once.” – Dustin Dykes

How does ransomware spread? – The hackers attach viruses to s that are designed to focus you on bogus content instead of looking for a virus. Beware of links and attachments, especially “.exe” and “.zip” files.

How does ransomware spread? You have won something You owe money Your password is expired Forms asking for personal information If a device is infected, information on that device can be used to infect others

rn m cl d

Is my device Infected with Cryptolocker?

My device is infected, now what? Immediately turn off the device Unplug the network cable, if applicable

My device is infected, now what? Unplug any storage drives such as thumb drives or external hard drives Contact the helpdesk at x5888 immediately

How can I prevent becoming infected? Be careful about the links you click on and the attachments you open. If it looks questionable in any way, send it to

How can I prevent becoming infected? Backup files to offline storage (disconnected external drives) regularly Avoid using software that automatically syncs cloud storage such as OneDrive, Google Drive, Drop Box, etc.

Will it hurt? Photos Music Videos Documents Financial Health Teaching/department Documents

What is the Technology Department doing to prevent an infection? Educating BISD staff Keeping anti-virus and spam protection updated Regular backups Pursuing new endpoint protection approaches

This presentation is available on our BISD Technology Knowledgebase: – Search “Ransomware”