+ All Categories
Home > Documents > Ransomware Infographic May2016 - SolarWinds · CHECK YOUR BACKUP Ensure your critical files are...

Ransomware Infographic May2016 - SolarWinds · CHECK YOUR BACKUP Ensure your critical files are...

Date post: 09-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
1
Be on alert for ransomware — viruses designed by cyberthieves to lock you out of your computer until you pay a ransom. YOURSELF AND YOUR COMPANY YOUR RANSOMWARE WARNING! PROTECT RANSOMWARE Email Internet Downloads PDFs A RANSOMWARE INFECTION MEANS: RANSOMWARE ATTACKS I know the sender of this email. It makes sense that this was sent to me. The attached link or PDF is something I can verify is safe. The email doesn’t threaten to close my accounts or cancel my cards if I don’t provide information. This email is from someone I trust, it doesn’t just look like someone I trust. Nothing seems “off” about this email, its contents or sender. SAFETY CHECKLIST: PREVENTION KIT Created by the security experts at UPDATE, UPDATE, UPDATE Keep on top of updates for your antivirus and other applications. Don’t say no to familiar updates! BEWARE OF POPUPS Immediately close popups that ask you to update your account information or install applications you did not specifically request. STAY VIGILANT If it sounds too good to be true, it is. Stick with trusted sites and don’t fall victim to scams (like “You’re a Winner!” banners). Be aware of email attachments: ransomware commonly comes in the form of a bogus shipping receipt. CHECK YOUR BACKUP Ensure your critical files are being backed often, prefera- bly offsite, in case you do get infected. Files saved to an attached USB drive or another location on your network are still vulnerable! BOOKMARK YOUR FAVORITES Hackers often create pages with names very close to commonly used sites (Gogle.com, for exam- ple). Save your most-used websites to avoid typing the wrong address and ending up somewhere you don’t want to be. If you think you’ve been infected, DON’T FEED THE HACKERS! Unplug your computer from the network and call your IT service provider immediately. LISTEN TO YOUR ANTIVIRUS If you get a warning from your antivirus about a possible threat, don’t dismiss it. Report it to your support team, with lots of details! Winner! Temporary or permanent data loss. Little or no access to systems and applications. Disruption to your regular operations. Financial loss. Harm to your organization’s reputation. RESCUE THREATS SEEM INNOCENT WHEN THEY ARRIVE LOOKING LIKE… CHECK ALL OF YOUR EMAILS CAREFULLY BEFORE OPENING THEM! …BUT ONE CLICK CAN LET AN INFECTION INTO YOUR ENTIRE NETWORK. HOW TO RECOGNIZE AND AVOID A DATA HOSTAGE SITUATION 500,000 2014 2015 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 0 1,000,000 1,500,000 2,000,000 2,500,000 3,000,000 3,500,000 4,000,000 4,500,000 5,000,000 5,500,000 6,000,000 6,500,000
Transcript
Page 1: Ransomware Infographic May2016 - SolarWinds · CHECK YOUR BACKUP Ensure your critical files are being backed often, prefera-bly offsite, in case you do get infected. Files saved

Be on alert for ransomware — viruses designed by cyberthieves to lock you out of your computer until you pay a ransom.

YOURSELF AND YOUR COMPANY

YOUR RANSOMWARE

WARNING!

PROTECT

RANSOMWARE

Email Internet Downloads PDFs

A RANSOMWARE INFECTION MEANS:

RANSOMWARE ATTACKS

I know the sender of this email.It makes sense that this was sent to me.The attached link or PDF is something I can verify is safe.The email doesn’t threaten to close my accounts or cancel my cards if I don’t provide information.This email is from someone I trust, it doesn’t just look like someone I trust.Nothing seems “off” about this email, its contents or sender.

SAFETY CHECKLIST:

PREVENTION KIT

Created by the security experts at

UPDATE, UPDATE, UPDATEKeep on top of updates for your antivirus and other applications. Don’t say no to familiar updates!

BEWARE OF POPUPSImmediately close popups that ask you to update your account information or install applications you did not specifically request.

STAY VIGILANTIf it sounds too good to be true, it is. Stick with trusted sites and don’t fall victim to scams (like “You’re a Winner!” banners). Be aware of email attachments: ransomware commonly comes in the form of a bogus shipping receipt.

CHECK YOUR BACKUPEnsure your critical files are being backed often, prefera-bly offsite, in case you do get infected. Files saved to an attached USB drive or another location on your network are still vulnerable!

BOOKMARK YOUR FAVORITESHackers often create pages with names very close to commonly used sites (Gogle.com, for exam-ple). Save your most-used websites to avoid typing the wrong address and ending up somewhere you don’t want to be.

If you think you’ve been infected, DON’T FEED THE HACKERS! Unplug your computer from the network

and call your IT service provider immediately.

LISTEN TO YOUR ANTIVIRUSIf you get a warning from your antivirus about a possible threat, don’t dismiss it. Report it to your support team, with lots of details!

Winner!

Temporary or permanent data loss.Little or no access to systems and applications. Disruption to your regular operations.Financial loss.Harm to your organization’s reputation.

RESCUE

THREATS SEEM INNOCENT WHEN THEY ARRIVE LOOKING LIKE…

CHECK ALL OF YOUR EMAILS CAREFULLY BEFORE OPENING THEM!

…BUT ONE CLICK CAN LET AN INFECTION INTO YOUR ENTIRE NETWORK.

HOW TO RECOGNIZE AND AVOID A DATA HOSTAGE SITUATION

500,000

2014 2015Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4

0

1,000,000 1,500,000 2,000,000 2,500,000 3,000,000 3,500,000 4,000,000 4,500,000 5,000,000 5,500,000 6,000,000 6,500,000

Recommended