Download Quick guide about Ransomware (cryptofile virus)

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Childhood immunizations in the United States wikipedia , lookup

Neonatal infection wikipedia , lookup

Infection control wikipedia , lookup

Hospital-acquired infection wikipedia , lookup

Transcript
What is Ransomware? It’s a computer program with a malicious aim, which can provoke the loss of all your information. Before the infection (prevention): ●
●
●
●
●
Do periodically security copies of all important data. Maintain your computer actualize (operative system and apps). Active the Windows firewall and use Google anti­spam system. Active the option that shows the extensions of files. Active the option “Restore the system”. For preventing infections: 1. Be suspicious about de mail messages that comes from an known transmitter, but they show some of these characteristics: 2.
3.
4.
5.
6.
7.
a. It’s not well redacted b. Shows important orthographic or grammatical mistakes. c. Text is written in different languages or seems translated with an extern program. d. Text mix masculine and feminine pronouns. e. Text is written in a style that’s not usual by the author that is sending it. Be suspicious about mail messages from companies who don’t have any link with the addressee: Be suspicious about mail messages without greetings and only ask for opening an attached file. Don’t open any executable attached file. Save always the attached files and check if that files are the correct ones (no double extension). Surf the internet through safe websites. and use block adds programs When you download a program, please, read properly all the steps and uncheck all you aren’t interested in. If you are infected or you suspect to be (reaction): ●
●
Turn off your computer and contact with the IT Service and notify the infection. Inform by the most precise way about how the infection happens. For restoring the infected files (recovering): ●
●
●
●
A security copy in a hard disk that mustn’t be connected to the computer. A copy on Dropbox / Drive: These programs allow recuperating “previous versions” of your files, which aren’t infected. “Restore the system” option. DO NOT PAY EVER! Remember: If you need more information or some help about how to apply one of these measures, please, contact with IT Service.