Online Safety Community

Ransomware is a malicious software that attacks the vital IT systems of organizations. Most ransomware attacks come in the form of normal mails, eliciting that the user open an attachment. When unsuspecting employees or individuals do so, the virus blocks their access to files in the system. The attackers unlock or release the access to the files only when the ransom, usually in the form of money, is transferred to their account through surreptitious means. Hence the name.

Typically, people who operate ransomware hold sensitive personal and organizational date to ransom. Sometimes, they could even seek just information and not money in return for releasing the files. This adds to the complexity and variety of the issue.

The size of the organization is not a criterion for a ransomware attack

The traditional belief has been that small organizations are vulnerable to ransomware attacks. However, the recent WannaCry attack has demonstrated that the reach and power of such cyberattacks are wider and stronger than believed. If governmental organizations such as the UK’s National Health Service could be targeted, one can imagine the fate of smaller organizations. This recent WannaCry attack also showed the particular penchant that these attackers have for assailing data related to health. It is true that in the US, health information commands a higher price in the black market than even social security and credit card information.

This, however, is not to suggest that other sector need to be complacent and develop a sense of false security. Just any organization, doing a business of any kind, located in any part of the world, and of any size, could be a potential target for ransomware attacks. If this were not to be the case; the estimated loss that organizations around the world suffer on account of ransomware attacks would not be amounting to around the $ 3.5 trillion annually that they currently do.

Learning on how to prevent ransomware

Given the nature and intensity of the problem, and considering that almost any and every PC, laptop, tablet or mobile –i.e., just about any device –could be a source of a ransomware attack; how do organizations deal with an issue as big and serious as this?

The ways of learning to spot a ransomware attack and preventing it will be the learning a webinar from TrainHR, a leading provider of professional trainings for the human resources industry, will offer. Paula Pierce, an Austin, Texas attorney who provides legal services to identity theft victims, has authored numerous publications for victims of identity theft and for attorneys and is a frequent speaker on identity theft and financial fraud, and previously founded a regional legal services program for victims of identity theft and financial fraud; will be the speaker at this webinar. 

Want to understand how to tackle ransomware? Please register for this webinar by visiting TrainHR   to benefit from Paula's rich experience in this area. Viewing this webinar, its entirety qualifies for a recertification credit hour that may be counted toward SHRM-CP and SHRM-SCP recertification from SHRM. Credit is awarded based on the actual educational time spent in the program.

This webinar has been approved for 1 HR (General) recertification credit hours toward aPHR, PHR, PHRca, SPHR, GPHR, PHRi and SPHRi recertification through HR Certification Institute (HRCI).

In this highly relevant session on this very pertinent topic, Paula will cover the following areas:

  • What is Malware?
  • What is Ransomware?
  • How does Ransomware Work?
  • How can Employees Recognize Potential Malware?
  • What should Employees do when they see Potential Malware?
  • What should you do if you become the victim of a Ransomware Attack?


Views: 14


You need to be a member of Online Safety Community to add comments!

Join Online Safety Community

Take our poll!

Take our poll!

Latest Activity

Training Doyens posted events
10 minutes ago
Nakul Pratap posted a blog post
56 minutes ago
Elena Lauren posted an event

Live Informatica Training | Informatica Course by Experts - Enroll Now! at 1734 Blue Lake, CT Tarpon Springs FL 34689 United States (US)

March 19, 2018 to December 25, 2018
Why Informatica?Informatica provides the market's leading data integration platform. Tested on nearly 500,000 combinations of platforms and applications, the data integration platform inter operates with the broadest possible range of disparate standards, systems, and applications.This unbiased and universal view makes Informatica unique in today's market as a leader in the data integration platform.Informatica PowerCenter is a premium data integration solution available today.What are…See More
3 hours ago
Mark Nilson posted an event

Preparing for OSHA Voluntary Protection Program (VPP) Requirements: Brick by Brick at Training Doyens 26468 E Walker Dr

April 3, 2018 from 1pm to 2:30pm
OVERVIEWTake a closer look at the OSHA VPP certification and how your organization can achieve this affirmation at being top in health and safety management.Masons start their masterpieces brick by brick, carefully and skilfully placing each in its place. With Voluntary Protection Program, or VPP, everyone is a mason. Everyone has a brick or two to contribute to the success of the organization, and everyone counts on the next one to do their part. Eventually, the collective team achieves its…See More
4 hours ago


Understanding Data Parallelism in MapReduce

In order to understand the goals of MapReduce, it is important to realize for which scenarios MapReduce is optimized. The MapReduce programming model is created for processing data which requires…Continue

Tags: program, Implementation, Mapreduce

Started by gracylayla on Wednesday.

Automation Anywhere. How do I pick a value from dropdown

Automation Anywhere. How do I pick a value from dropdown. I tried 'set text' from a copied variable. Its very slow, and also doesnt…Continue

Tags: anywhere, automation

Started by emmablisa Mar 9.

TensorFlow serving vs TensorFlow service

I have a question regarding the difference between TensorFlow Serving versus TensorFlow service. (Sorry that I'm not familiar with this at all.)I found TensorFlow serving's definition, which is "…Continue

Tags: training, online, tensorflow

Started by emmablisa Feb 27.

Proper maintenance for Hi Vis clothing

Can you tell me how to properly take care of Hi Vis jackets? I recently purchased a few ones from this…Continue

Started by Lily Osborn Feb 25.

Forklift Operator Requirements 1 Reply

At our company we have a lot of forklift traffic that has to share the same aisles as our pedestrians. We limit the speed of our lifts to 3 mph.  I am wanting to find out what requirements for…Continue

Started by Rick Briggs. Last reply by Tony Ferraro Feb 25.



© 2018   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service