{"id":272,"date":"2019-01-31T15:21:11","date_gmt":"2019-01-31T14:21:11","guid":{"rendered":"https:\/\/security.ieseg.fr\/en\/?page_id=272"},"modified":"2019-02-01T09:13:27","modified_gmt":"2019-02-01T08:13:27","slug":"week-4-ransomware","status":"publish","type":"page","link":"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/","title":{"rendered":"Week 4 &#8211; Ransomware"},"content":{"rendered":"<h2>What is?<\/h2>\n<p>Ransomware is malware that employs encryption to hold a victim\u2019s information at ransom. A user\u2019s critical data is encrypted so that they cannot access personal files and a ransom is demanded to provide access to the files.<\/p>\n<p>Many variations of ransomware exist. Often ransomware (and other malware) is distributed using email spam campaigns or through targeted attacks. Malware needs an attack vector to establish its presence on an endpoint. After presence is established, malware stays on the system until its task is accomplished.<\/p>\n<div class=\"bloc-tips\">\n<h2>Tips:<\/h2>\n<p><strong>How to defend against ransomware?<\/strong><\/p>\n<ul>\n<li>Back up your data<\/li>\n<li>Back up your data<\/li>\n<li>Back up your data \u263a<\/li>\n<li>Use security software and keep it up to date<\/li>\n<li>Apply the same tips that email phishing <a href=\"https:\/\/security.ieseg.fr\/en\/campain\/week-1-email-phishing\/\">(Week 1)<\/a><\/li>\n<li>Don\u2019t pay the ransom<\/li>\n<\/ul>\n<\/div>\n<p>&nbsp;<\/p>\n<h2>Take test<\/h2>\n<p><iframe loading=\"lazy\" src=\"https:\/\/ieseg.az1.qualtrics.com\/jfe\/form\/SV_6RO9oC1VakceBXn\" width=\"600px\" height=\"800px\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is? Ransomware is malware that employs encryption to hold a victim\u2019s information at ransom. A user\u2019s critical data is encrypted so that they cannot access personal files and a ransom is demanded to provide access to the files. Many variations of ransomware exist. Often ransomware (and other malware) is distributed using email spam campaigns [&hellip;]<\/p>\n","protected":false},"author":705,"featured_media":0,"parent":332,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Week 4 - Ransomware - Security - I\u00c9SEG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Week 4 - Ransomware - Security - I\u00c9SEG\" \/>\n<meta property=\"og:description\" content=\"What is? Ransomware is malware that employs encryption to hold a victim\u2019s information at ransom. A user\u2019s critical data is encrypted so that they cannot access personal files and a ransom is demanded to provide access to the files. Many variations of ransomware exist. Often ransomware (and other malware) is distributed using email spam campaigns [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Security - I\u00c9SEG\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-01T08:13:27+00:00\" \/>\n<meta name=\"author\" content=\"anaisandreosso\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/security.ieseg.fr\/#website\",\"url\":\"https:\/\/security.ieseg.fr\/\",\"name\":\"Security - I\u00c9SEG\",\"description\":\"Think before you click!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/security.ieseg.fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/#webpage\",\"url\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/\",\"name\":\"Week 4 - Ransomware - Security - I\u00c9SEG\",\"isPartOf\":{\"@id\":\"https:\/\/security.ieseg.fr\/#website\"},\"datePublished\":\"2019-01-31T14:21:11+00:00\",\"dateModified\":\"2019-02-01T08:13:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/security.ieseg.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Campaigns\",\"item\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2019 Campaign\",\"item\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Week 4 &#8211; Ransomware\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Week 4 - Ransomware - Security - I\u00c9SEG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Week 4 - Ransomware - Security - I\u00c9SEG","og_description":"What is? Ransomware is malware that employs encryption to hold a victim\u2019s information at ransom. A user\u2019s critical data is encrypted so that they cannot access personal files and a ransom is demanded to provide access to the files. Many variations of ransomware exist. Often ransomware (and other malware) is distributed using email spam campaigns [&hellip;]","og_url":"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/","og_site_name":"Security - I\u00c9SEG","article_modified_time":"2019-02-01T08:13:27+00:00","author":"anaisandreosso","twitter_card":"summary","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/security.ieseg.fr\/#website","url":"https:\/\/security.ieseg.fr\/","name":"Security - I\u00c9SEG","description":"Think before you click!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security.ieseg.fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/#webpage","url":"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/","name":"Week 4 - Ransomware - Security - I\u00c9SEG","isPartOf":{"@id":"https:\/\/security.ieseg.fr\/#website"},"datePublished":"2019-01-31T14:21:11+00:00","dateModified":"2019-02-01T08:13:27+00:00","breadcrumb":{"@id":"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/week-4-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/security.ieseg.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Campaigns","item":"https:\/\/security.ieseg.fr\/en\/campaigns\/"},{"@type":"ListItem","position":3,"name":"2019 Campaign","item":"https:\/\/security.ieseg.fr\/en\/campaigns\/2019-campaign\/"},{"@type":"ListItem","position":4,"name":"Week 4 &#8211; Ransomware"}]}]}},"_links":{"self":[{"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/272"}],"collection":[{"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/users\/705"}],"replies":[{"embeddable":true,"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/comments?post=272"}],"version-history":[{"count":3,"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/272\/revisions"}],"predecessor-version":[{"id":275,"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/272\/revisions\/275"}],"up":[{"embeddable":true,"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/332"}],"wp:attachment":[{"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/media?parent=272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}