It’s often said there are two type of computers in the world—those that have been hit by ransomware and those that will.
Ransomware attacks are increasing around the world. According to the FBI, 4,000 ransomware attacks occurred every day in 2016, which is a 300% increase in attacks since 2015.
79% of organizations have experienced a security-related breach within the last 12 months, with ransomware comprising a large portion of these attacks. Protecting against ransomware is a top concern for organizations and individuals alike, and a basic understanding of how to prevent and combat ransomware attacks is critical.
With the increase in ransomware attacks, it’s possible that the saying should be that there are two types of computer users in the world—those that know they have been infected by malware and those that have been infected but don't know it.
Consider how you would be affected if you or your organization were targeted by a ransomware attack, which may include losing valuable files or paying large ransoms.
Ransomware attacks can be prevented with proper preparation, utilizing the correct resources, and creating a preemptive plan. The goal of this course is to prepare you for action when ransomware attacks occur, including preventing and identifying attacks, how to remedy the situation, and solutions that will minimize losses.
This course will educate you on the basics of ransomware, including what it is, how it works, and ways you can get infected with ransomware. This course also covers the basics of cryptography and how it affects ransomware, how to prevent attacks, what to do if you have been hit with ransomware, and tools you can use to combat attacks.
The course is just over 1 hour and 20 minutes and includes 36 lessons.
There are 7 major sections, each with a page of associated links.
Ransomware attacks are constantly evolving. While this course provides a basic understanding of ransomware, it is important to stay up to date on the latest information to prevent and combat attacks.
I am an IT professional with over 30 years of experience. I specialize in IT security related to desktop computing and mobile computing, with sub-specialties in malware removal and training and documentation.