MODULE CONTENTS
This training module is devoted to the principle of ransomware. It gives some techniques to identify this type of attack. It also proposes good practices to adopt in case of attack. This module consists of a 3-minute motion design followed by a quiz to validate the learners' knowledge.
PEDAGOGICAL OBJECTIVES
Know the ransomware
Recognize the techniques used by hackers
Giving good practices in case of an attack
Ransomware is malicious software that encrypts all the data on your computer.
It can spread to the entire corporate network and paralyze it completely. In exchange for ransom, the hacker offers to return a decryption key that will allow you to retrieve your data. Chances are you'll never get that key and your data will be irretrievably lost.
To avoid this unfortunate situation, a certain number of precautions must be taken, here is a set of good practices to observe:
First of all, always be vigilant when a message suggests clicking on a link or opening an attachment.
Only download trusted software from the publisher's site.
A trusted site can be recognized by the presence of a padlock and the letter "s" in the prefix "https://" in the browser address bar.
Remember to ask your IT department in case of doubt.
Update your applications on a regular basis, as malware often uses security holes, which are corrected by the publisher when it becomes aware of them.
Also make sure that your data is always backed up regularly, away from your computer, preferably on a secure server or in the cloud.
In the event of an attack, unplug the network cable from your computer immediately. This will prevent the virus from spreading to other machines and thus protect the entire network.
Immediately report the attack to your hierarchy or to the IT department.
Filing a complaint with the police can help to stop the hacker(s).