Online Safety Community

Ransomware is a malicious software that attacks the vital IT systems of organizations. Most ransomware attacks come in the form of normal mails, eliciting that the user open an attachment. When unsuspecting employees or individuals do so, the virus blocks their access to files in the system. The attackers unlock or release the access to the files only when the ransom, usually in the form of money, is transferred to their account through surreptitious means. Hence the name.

Typically, people who operate ransomware hold sensitive personal and organizational date to ransom. Sometimes, they could even seek just information and not money in return for releasing the files. This adds to the complexity and variety of the issue.

The size of the organization is not a criterion for a ransomware attack

The traditional belief has been that small organizations are vulnerable to ransomware attacks. However, the recent WannaCry attack has demonstrated that the reach and power of such cyberattacks are wider and stronger than believed. If governmental organizations such as the UK’s National Health Service could be targeted, one can imagine the fate of smaller organizations. This recent WannaCry attack also showed the particular penchant that these attackers have for assailing data related to health. It is true that in the US, health information commands a higher price in the black market than even social security and credit card information.

This, however, is not to suggest that other sector need to be complacent and develop a sense of false security. Just any organization, doing a business of any kind, located in any part of the world, and of any size, could be a potential target for ransomware attacks. If this were not to be the case; the estimated loss that organizations around the world suffer on account of ransomware attacks would not be amounting to around the $ 3.5 trillion annually that they currently do.

Learning on how to prevent ransomware

Given the nature and intensity of the problem, and considering that almost any and every PC, laptop, tablet or mobile –i.e., just about any device –could be a source of a ransomware attack; how do organizations deal with an issue as big and serious as this?

The ways of learning to spot a ransomware attack and preventing it will be the learning a webinar from TrainHR, a leading provider of professional trainings for the human resources industry, will offer. Paula Pierce, an Austin, Texas attorney who provides legal services to identity theft victims, has authored numerous publications for victims of identity theft and for attorneys and is a frequent speaker on identity theft and financial fraud, and previously founded a regional legal services program for victims of identity theft and financial fraud; will be the speaker at this webinar. 

Want to understand how to tackle ransomware? Please register for this webinar by visiting TrainHR   to benefit from Paula's rich experience in this area. Viewing this webinar, its entirety qualifies for a recertification credit hour that may be counted toward SHRM-CP and SHRM-SCP recertification from SHRM. Credit is awarded based on the actual educational time spent in the program.

This webinar has been approved for 1 HR (General) recertification credit hours toward aPHR, PHR, PHRca, SPHR, GPHR, PHRi and SPHRi recertification through HR Certification Institute (HRCI).

In this highly relevant session on this very pertinent topic, Paula will cover the following areas:

  • What is Malware?
  • What is Ransomware?
  • How does Ransomware Work?
  • How can Employees Recognize Potential Malware?
  • What should Employees do when they see Potential Malware?
  • What should you do if you become the victim of a Ransomware Attack?

 

Views: 5

Comment

You need to be a member of Online Safety Community to add comments!

Join Online Safety Community

Take our poll!

Take our poll!

Latest Activity

Adam Fleaming posted a blog post

The GDPR differs Significantly from EC Data Protection Directive 95/ 46

The General Data Protection Regulation (GDPR), which has been codified as Regulation (EU) 2016/679, is a very powerful law regarding the protection of data of the half billion people who live in the European Union (EU). Having come into effect as a result of the European Commission having adapted the proposal for its creation on January 25, 2012; it will replace Directive…See More
yesterday
Adam Fleaming posted events
yesterday
John Robinson posted an event
Thumbnail

Laboratory Compliance webinar for $10 each at Online

August 16, 2017 at 10am to December 31, 2017 at 11am
Want to enhance your regulatory compliance career by learning a new course? All that it costs is $10. Yes, GlobalCompliancePanel, a provider of professional trainings, is offering hundreds of high value regulatory compliance courses for a mere $10 each.Regulatory compliance learning, that vital ingredient needed for professionals in any area of regulatory compliance, is a put off, because many…See More
yesterday
rodriguezcecelia posted a blog post

How PMP Certification impact Your Salary?

Before investing money and time in PMP certification, it is very important for anyone to understand how the certification will impact salary. In this article, we will discuss PMP certification and its effects on salary, which can help you to decide whether you should go for it or not. We will focus on different perspectives of PMP salary, which is based on experience, the size of the company, designation and many others. Overview of PMP CertificationThough the PMP certification salary hike is…See More
Tuesday

Forum

Safety - A Prerequisite 11 Replies

Whether working at home or outside, to observe safety should be our pre-requisite. The employer before anything must be sure of the safety of its employees especially the ones working in mines or any…Continue

Tags: products, safety

Started by Enna Henry. Last reply by Tara safe yesterday.

Lean Six Sigma Black Belt Training in New York City

Welcome to MSys Training! We thank you for visiting MSys LSSBB training page. Attend our 4 days Lean Six Sigma Black Belt (LSSBB) training program with 100% pass rate, high quality course material,…Continue

Tags: sigma, six

Started by rodriguezcecelia Aug 11.

ITIL Certification Training - MSysTraining

The ITIL® Foundation is an entry level qualification in Information Technology industry. It gives participants information about the key elements, terminologies and concepts used in the ITIL Service…Continue

Tags: itil

Started by rodriguezcecelia Aug 8.

Snowflake and Star Schema in Qlikview

In big name schema all of the facts are stored in one important table and the usage of number one key and overseas key courting different measurement tables are related with the fact desk.SNOWFLAKE…Continue

Tags: processing, transactional, qlikview

Started by Soujanya Naganuri Jul 25.

What is Class Structure in Pega?

Class contains the rule by way of which objects behave. outline rules such as houses, sports, flows, html paperwork, etc. to be had to different subordinate classes. lessons are organized into a…Continue

Started by Soujanya Naganuri Jul 17.

Badge

Loading…

© 2017   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service