{"id":560,"date":"2020-03-02T14:08:22","date_gmt":"2020-03-02T13:08:22","guid":{"rendered":"https:\/\/security.ieseg.fr\/en\/?page_id=560"},"modified":"2020-03-04T09:18:59","modified_gmt":"2020-03-04T08:18:59","slug":"week-2-ransomware","status":"publish","type":"page","link":"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/","title":{"rendered":"Week 2 &#8211; Ransomware"},"content":{"rendered":"<h2>What is?<\/h2>\n<p>Warning ! Ransomware designed to block access to your computer and your data until a sum of money is paid. <\/p>\n<p>Threats seem innocent when they arrive looking like email, internet download, pdf\u2019s but one click can an infection into your entire <strong>network and can paralyse the business!<\/strong> <\/p>\n<p><strong>A ransomware infection means: <\/p>\n<ul>\n<li>Temporary or permanent data loss<\/li>\n<li>No access to systems and applications<\/li>\n<li>Possible financial loss<\/li>\n<li>Harm to I\u00c9SEG\u2019s reputation<\/li>\n<\/ul>\n<p><\/strong><br \/>\n&nbsp; <\/p>\n<h2>Phishing Statistics:<\/h2>\n<ul>\n<li>In 2019 I\u00c9SEG\u2019s protection has blocked more of 700 ransomwares<\/li>\n<li>A company victim of a ransomware takes 16 days to recover its network<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div class=\"bloc-todo\">\n<h2>To do:<\/h2>\n<p>\u276f Stay vigilant: Apply the same tips that email phishing <a href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-1-phishing\/\">(Week 1)<\/a><br \/>\n\u276f Backup your data, preferably offsite <\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"bloc-tips\">\n<h2>Tips:<\/h2>\n<p><strong>If you think you\u2019ve been infected:<\/strong><\/p>\n<ol>\n<li>Unplug your computer or disconnect the wireless connection immediately.<\/li>\n<li>Call IT Department immediately.<\/li>\n<li>Do not pay the ransom.<\/li>\n<\/ol>\n<\/div>\n<p>&nbsp;<\/p>\n<h2>Take Test<\/h2>\n<div>\n<h3 id=\"quiz1\">Question 1<\/h3>\n<h4>In case\u00a0of attack, what should you do?<\/h4>\n<div class=\"row\" style=\"padding: 25px 0;\">\n<div class=\"col-sm-6\">\n<div class=\"row\">\n<div class=\"col-sm-12\" style=\"text-align: center; font-weight: bold; font-size: 24px; color: #131d63;\">CHOICE &#10102;<\/div>\n<div class=\"col-sm-12\"><img class=\"alignnone\" src=\"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/call-IT.png\" alt=\"\" \/><\/div>\n<div style=\"padding: 0 25px;\"><a class=\"col-sm-12 btn real\" style=\"text-align: center; white-space: break-spaces;\" href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/2020-week2-quiz1\">I immediately inform the IT department &#10095;<\/a><\/div>\n<\/div>\n<\/div>\n<div class=\"col-sm-6\">\n<div class=\"row\">\n<div class=\"col-sm-12\" style=\"text-align: center; font-weight: bold; font-size: 24px; color: #ce1135;\">CHOICE &#10103;<\/div>\n<div class=\"col-sm-12\"><img class=\"alignnone\" src=\"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/resolve-myself.png\" alt=\"\" \/><\/div>\n<div style=\"padding: 0 25px;\"><a class=\"col-sm-12 btn fake\" style=\"text-align: center; white-space: break-spaces;\" href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/2020-week2-quiz1\">I solve the problem by myself\u200b &#10095;<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<h3 id=\"quiz2\">Question 2<\/h3>\n<h4>What is the first thing to do if your data is being encrypted?<\/h4>\n<div class=\"row\" style=\"padding: 25px 0;\">\n<div class=\"col-sm-6\">\n<div class=\"row\">\n<div class=\"col-sm-12\" style=\"text-align: center; font-weight: bold; font-size: 24px; color: #131d63;\">CHOICE &#10102;<\/div>\n<div class=\"col-sm-12\"><img class=\"alignnone\" style=\"padding: 25px;\" src=\"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/computer-unplugged.png\" alt=\"\" \/><\/div>\n<div style=\"padding: 0 25px;\"><a class=\"col-sm-12 btn real\" style=\"text-align: center; white-space: break-spaces;\" href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/2020-week2-quiz2\">I unplug my computer from the network\u200b &#10095;<\/a><\/div>\n<\/div>\n<\/div>\n<div class=\"col-sm-6\">\n<div class=\"row\">\n<div class=\"col-sm-12\" style=\"text-align: center; font-weight: bold; font-size: 24px; color: #ce1135;\">CHOICE &#10103;<\/div>\n<div class=\"col-sm-12\"><img class=\"alignnone\" style=\"padding: 25px;\" src=\"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/computer-restart.png\" alt=\"\" \/><\/div>\n<div style=\"padding: 0 25px;\"><a class=\"col-sm-12 btn fake\" style=\"text-align: center; white-space: break-spaces;\" href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/2020-week2-quiz2\">I restart my computer\u200b\u200b &#10095;<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<h3 id=\"quiz3\">Question 3<\/h3>\n<h4>To recover my data?<\/h4>\n<div class=\"row\" style=\"padding: 25px 0;\">\n<div class=\"col-sm-6\">\n<div class=\"row\">\n<div class=\"col-sm-12\" style=\"text-align: center; font-weight: bold; font-size: 24px; color: #131d63;\">CHOICE &#10102;<\/div>\n<div class=\"col-sm-12\"><img class=\"alignnone\" style=\"padding: 25px;\" src=\"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/paiement-rancon.png\" alt=\"\" \/><\/div>\n<div style=\"padding: 0 25px;\"><a class=\"col-sm-12 btn real\" style=\"text-align: center; white-space: break-spaces;\" href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/2020-week2-quiz3\">I pay the ransom without talking to anyone\u200b\u200b &#10095;<\/a><\/div>\n<\/div>\n<\/div>\n<div class=\"col-sm-6\">\n<div class=\"row\">\n<div class=\"col-sm-12\" style=\"text-align: center; font-weight: bold; font-size: 24px; color: #ce1135;\">CHOICE &#10103;<\/div>\n<div class=\"col-sm-12\"><img class=\"alignnone\" style=\"padding: 25px;\" src=\"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/data-recovery.png\" alt=\"\" \/><\/div>\n<div style=\"padding: 0 25px;\"><a class=\"col-sm-12 btn fake\" style=\"text-align: center; white-space: break-spaces;\" href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/2020-week2-quiz3\">I restore my data from my backup\u200b\u200b &#10095;<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<h3 id=\"quiz4\">Question 4<\/h3>\n<h4>Local backup files \u2013 saved on your computer \u2013 are sufficient in case of ransomware?<\/h4>\n<div class=\"row\" style=\"padding: 25px 0;\">\n<div class=\"col-sm-6\">\n<div class=\"row\">\n<div class=\"col-sm-12\" style=\"text-align: center; font-weight: bold; font-size: 24px; color: #131d63;\">CHOICE &#10102;<\/div>\n<div class=\"col-sm-12\"><img class=\"alignnone\" style=\"padding: 25px;\" src=\"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/yes.png\" alt=\"\" \/><\/div>\n<div style=\"padding: 0 25px;\"><a class=\"col-sm-12 btn real\" style=\"text-align: center; white-space: break-spaces;\" href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/2020-week2-quiz4\">Yes\u200b\u200b &#10095;<\/a><\/div>\n<\/div>\n<\/div>\n<div class=\"col-sm-6\">\n<div class=\"row\">\n<div class=\"col-sm-12\" style=\"text-align: center; font-weight: bold; font-size: 24px; color: #ce1135;\">CHOICE &#10103;<\/div>\n<div class=\"col-sm-12\"><img class=\"alignnone\" style=\"padding: 25px;\" src=\"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/no.png\" alt=\"\" \/><\/div>\n<div style=\"padding: 0 25px;\"><a class=\"col-sm-12 btn fake\" style=\"text-align: center; white-space: break-spaces;\" href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/2020-week2-quiz4\">No &#10095;<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"row\" style=\"margin-top: 50px;\">\n<div class=\"bloc-help\">\n<h2>What to do if I gave my login\/password<\/h2>\n<p><strong>Don\u2019t panic !<\/strong><\/p>\n<p><a class=\"btn\" href=\"https:\/\/security.ieseg.fr\/en\/help\/\">GET SUPPORT \u276f <\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is? Warning ! Ransomware designed to block access to your computer and your data until a sum of money is paid. Threats seem innocent when they arrive looking like email, internet download, pdf\u2019s but one click can an infection into your entire network and can paralyse the business! A ransomware infection means: Temporary or [&hellip;]<\/p>\n","protected":false},"author":705,"featured_media":0,"parent":364,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Week 2 - Ransomware - Security - I\u00c9SEG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Week 2 - Ransomware - Security - I\u00c9SEG\" \/>\n<meta property=\"og:description\" content=\"What is? Warning ! Ransomware designed to block access to your computer and your data until a sum of money is paid. Threats seem innocent when they arrive looking like email, internet download, pdf\u2019s but one click can an infection into your entire network and can paralyse the business! A ransomware infection means: Temporary or [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Security - I\u00c9SEG\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-04T08:18:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/call-IT.png\" \/>\n<meta name=\"author\" content=\"anaisandreosso\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/security.ieseg.fr\/#website\",\"url\":\"https:\/\/security.ieseg.fr\/\",\"name\":\"Security - I\u00c9SEG\",\"description\":\"Think before you click!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/security.ieseg.fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/#primaryimage\",\"url\":\"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/call-IT.png\",\"contentUrl\":\"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/call-IT.png\",\"width\":500,\"height\":500},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/#webpage\",\"url\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/\",\"name\":\"Week 2 - Ransomware - Security - I\u00c9SEG\",\"isPartOf\":{\"@id\":\"https:\/\/security.ieseg.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/#primaryimage\"},\"datePublished\":\"2020-03-02T13:08:22+00:00\",\"dateModified\":\"2020-03-04T08:18:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/security.ieseg.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Campaigns\",\"item\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2020 Campaign\",\"item\":\"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Week 2 &#8211; Ransomware\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Week 2 - Ransomware - Security - I\u00c9SEG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Week 2 - Ransomware - Security - I\u00c9SEG","og_description":"What is? Warning ! Ransomware designed to block access to your computer and your data until a sum of money is paid. Threats seem innocent when they arrive looking like email, internet download, pdf\u2019s but one click can an infection into your entire network and can paralyse the business! A ransomware infection means: Temporary or [&hellip;]","og_url":"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/","og_site_name":"Security - I\u00c9SEG","article_modified_time":"2020-03-04T08:18:59+00:00","og_image":[{"url":"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/call-IT.png"}],"author":"anaisandreosso","twitter_card":"summary","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/security.ieseg.fr\/#website","url":"https:\/\/security.ieseg.fr\/","name":"Security - I\u00c9SEG","description":"Think before you click!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security.ieseg.fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/#primaryimage","url":"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/call-IT.png","contentUrl":"https:\/\/security.ieseg.fr\/wp-content\/uploads\/sites\/19\/2020\/03\/call-IT.png","width":500,"height":500},{"@type":"WebPage","@id":"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/#webpage","url":"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/","name":"Week 2 - Ransomware - Security - I\u00c9SEG","isPartOf":{"@id":"https:\/\/security.ieseg.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/#primaryimage"},"datePublished":"2020-03-02T13:08:22+00:00","dateModified":"2020-03-04T08:18:59+00:00","breadcrumb":{"@id":"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/week-2-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/security.ieseg.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Campaigns","item":"https:\/\/security.ieseg.fr\/en\/campaigns\/"},{"@type":"ListItem","position":3,"name":"2020 Campaign","item":"https:\/\/security.ieseg.fr\/en\/campaigns\/2020-campaign\/"},{"@type":"ListItem","position":4,"name":"Week 2 &#8211; Ransomware"}]}]}},"_links":{"self":[{"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/560"}],"collection":[{"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/users\/705"}],"replies":[{"embeddable":true,"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/comments?post=560"}],"version-history":[{"count":7,"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/560\/revisions"}],"predecessor-version":[{"id":609,"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/560\/revisions\/609"}],"up":[{"embeddable":true,"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/pages\/364"}],"wp:attachment":[{"href":"https:\/\/security.ieseg.fr\/en\/wp-json\/wp\/v2\/media?parent=560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}