Reveton – Locks screen using a bogus display that warns the user that they have violated federal law. The message further declares the user’s IP address has been identified by the Federal Bureau of Investigation as visiting websites that feature illegal content.<\/span><\/li>\n<\/ul>\nThe ransom demanded to decrypt or restore the affected files tends to depend on the perceived value of the data to the user, which usually is payable in Bitcoin, and \u00a0is not easily traced. It should be noted that the value of the Bitcoin changes daily, and so could be costly to purchase when needed.<\/span><\/p>\n
<\/object><\/p>\nWithout a doubt, ransomware is a serious threat to the security of networks and to computing devices. Although it is not possible to completely eliminate the possibility of an attack, below are some practices that IT security firm, <\/span>Sophos<\/span><\/a>, recommends be adopted:<\/span><\/p>\n
\nBackup regularly and keep a recent backup copy off-site.<\/span><\/li>\n Don\u2019t enable macros in document attachments received via email<\/span><\/li>\n Be cautious about unsolicited attachments<\/span><\/li>\n Don\u2019t give yourself more login power than you need<\/span><\/li>\n Consider installing the Microsoft Office viewers<\/span><\/li>\n Patch early, patch often.<\/span><\/li>\n<\/ul>\n <\/p>\n
Image credit: \u00a0sheelamohan ( FreeDigitalPhotos.net<\/a><\/em>)<\/p>\n
_________________<\/p>\n","protected":false},"excerpt":{"rendered":"
Ransomware attacks have been on the rise, and are being experienced in the Caribbean. Here is a quick summary of the threat and actions that could be taken to minimise […]<\/p>\n","protected":false},"author":2,"featured_media":81357,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[17,27,11],"tags":[105,38,39,262,15],"class_list":["post-81355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-caribbean","category-computing","category-ict-tech","tag-cybercrimecybersecurity","tag-data-protection","tag-equipment-security","tag-it-security","tag-trends","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2016\/03\/Safety-Concept-Closed-Padlock-On-Digital-Background%E2%80%9D-by-sheelamohan-FreeDigitalPhotos.net_.jpg?fit=400%2C266&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-lab","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/81355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=81355"}],"version-history":[{"count":5,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/81355\/revisions"}],"predecessor-version":[{"id":97022,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/81355\/revisions\/97022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/81357"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=81355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=81355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=81355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}