What is Ransomware? How Do You Protect Your Family, Data and Devices?

Thursday, Jul 22, 2021
  • Resource Center
  • What is Ransomware? How Do You Protect Your Family, Data and Devices?

Ransomware is one of the cyber-attacks that is on the rise in response to the pandemic. Homes are being used as business offices, and computers and networks are being shared by family members. Families are taking classes, doing homework and surfing the web in addition to performing business functions.

Ransomware is a type of malware that is normally delivered through a phishing message. The message entices the reader to click on a link or open an attachment. Once this is done, the process of infecting the device is started. A connection is initiated back to the attacker’s device to receive instructions for encrypting the device. Once the encryption is completed, the user is locked out of the data and the device. A ransomware note is then displayed and ransom is demanded in cryptocurrency to regain access.

Here are some best practices for cyber hygiene that can help protect you from becoming a victim:

  • Do not open any emails from someone you don’t know or that you aren’t expecting to receive.
  • Do not click on links in messages.
  • Avoid opening attachment in messages. Download attachments and scan them for malware prior to opening them.
  • If it sounds too good to be true, it probably is. Do not give away any personal information that could allow an attacker to compromise your devices or steal your identity.
  • Install anti-virus/anti-malware software on our device and keep it up to date.
  • Apply patches to all applications and the operating system as they become available.
  • Do not browse suspicious sites. Cybercriminals count on users mistyping the name of a legitimate site. These sites are made to look legitimate, but are used to deliver malware to the device.
  • Do not respond to pop-up windows instruction you to call a number for support. Once you allow them to remotely access your device, they will install additional malware on your device instead of removing it. Attackers also use this method to steal your personal and credit card information.
  • business
  • electronic
  • security

You May Like

Federal cybersecurity office releases tips for consumers on avoiding holiday scams

Federal cybersecurity office releases tips for consumers on avoiding holiday scams

The Office of Cybersecurity and Critical Infrastructure Protection has released a consumer advisory on avoiding cyber and online scams during the holiday season, including a warning about suspicious texts or emails claiming to come from financial institutions. OCCIP noted that cybercrime contributed to more than $12.5 billion in losses in 2023, marking a 22% increase from 2022.… Continue reading Federal cybersecurity office releases tips for consumers on avoiding holiday scams

Continue Reading
Do You Practice Safe Checks?

Do You Practice Safe Checks?

Despite the fact that check use has declined by 25%, reports of check fraud have soared. In fact, they’ve nearly doubled since 2021. Criminals are becoming more sophisticated and finding new ways to steal your financial information to gain access to your money. Kirkwood Bank & Trust is committed to helping our customers use checks… Continue reading Do You Practice Safe Checks?

Continue Reading
Can You Spot a Phishing Scam?

Can You Spot a Phishing Scam?

Every day, thousands of people fall victim to fraudulent emails, texts and calls from scammers pretending to be their bank. And in this time of expanded use of online and mobile banking, the problem is only growing worse. In fact, the Federal Trade Commission’s report on fraud estimates that American consumers lost a staggering $10… Continue reading Can You Spot a Phishing Scam?

Continue Reading
Keeping an Eye Out for Telcom Attacks

Keeping an Eye Out for Telcom Attacks

Summary Voice Over Internet Protocols (VoIP) is one-way threat actors attempt to trick unsuspecting consumers into sharing their confidential information, such as usernames, passwords, bank account information, and the like. These actors frequently use “ID Spoofing” as vehicles in their attack campaigns. ID Spoofing is when a caller deliberately falsifies the information transmitted to a… Continue reading Keeping an Eye Out for Telcom Attacks

Continue Reading
Don’t Get Scammed – FBI Fraud Alert

Don’t Get Scammed – FBI Fraud Alert

In March 2024, the FBI Internet Crime Complaint Center (IC3) released the 2023 IC3 Annual Report. In 2023, the IC3 received a record number of complaints from the American public: 880,418 complaints, with potential losses exceeding $12.5 billion. Most losses reported to the IC3 are the result of frauds and scams. Review the FBI Fraud… Continue reading Don’t Get Scammed – FBI Fraud Alert

Continue Reading
What should you do if you suspect your email account has been compromised?

What should you do if you suspect your email account has been compromised?

If you think your account has been compromised but you are not sure, it is better to err on the side of caution and follow these steps: Login to your email account and reset your password using a strong password. Use long passphrases to make passwords easier to remember and more secure. Do not use… Continue reading What should you do if you suspect your email account has been compromised?

Continue Reading