Recent postings and updates

Click any link below to view

May 13

Photo and obituary added to Olen Mitchell death notice

May 14

Photo and obituary added to Stewart "Greg" Willis' death notice

May 13

Ronald Pryde death notice updated



May 4

Family member of CHP Officer passed away

Today’s Date

Upcoming Events



Special Events

Click Icon to View


Regularly Scheduled Retiree Meetings


Calendar

Click icon to view

Fill out this form

Then

click “send” button below

 Marin Squad, 1933, SF Golden Gate Park

Submitted by Rich Simmons

Contact Us


Master Calendar

Support Your CHP Retiree Businesses

(Click on link)


Rest In Peace

Click name for details


Les Forsyth–New

Pat Terry

Eugene Wilkinson

Wesley Beck

John G. Hart

Richard Hartman

Stewart Willis

Olen K. Mitchell









Click icon above to Post Comments & Eulogies

Comments
CHP1010 now has 965 Subscribers....edging closer to our goal of 1,000.  Please tell your friends about us.
Click to Subscribe

Click Icon to

Post & View

Comments and Suggestions

Comments

Click banner to signup

Groups We recommend


Quick links


CHP Office Directory


Senior Discounts


Public Employee and Retiree Income


Medicare


Zenith 12000


US Govt. Resources


Lists of California


Newspapers & More




The CAHP

(Sign-in required)

Retirements





Threat of “Ransomware” continues to rise

FBI Reports


The inability to access the important data these kinds of organizations keep can be catastrophic in terms of the loss of sensitive or proprietary information, the disruption to regular operations, financial losses incurred to restore systems and files, and the potential harm to an organization’s reputation.


And, of course, home computers are just as susceptible to ransomware, and the loss of access to personal and often irreplaceable items—including family photos, videos, and other data—can be devastating for individuals as well.

Ransomware has been around for a few years, but during 2015, law enforcement saw an increase in these types of cyber attacks, particularly against organizations because the payoffs are higher. And if the first three months of this year are any indication, the number of ransomware incidents—and the ensuing damage they cause—will grow even more in 2016 if individuals and organizations don’t prepare for these attacks in advance.

 

Tips for Dealing with the Ransomware Threat

While the below tips are primarily aimed at organizations and their employees, some are also applicable to individual users.

Prevention Efforts


Business Continuity Efforts


  

In a ransomware attack, victims—upon seeing an e-mail addressed to them—will open it and may click on an attachment that appears legitimate, like an invoice or an electronic fax, but which actually contains the malicious ransomware code. Or the e-mail might contain a legitimate-looking URL, but when a victim clicks on it, they are directed to a website that infects their computer with malicious software.


One the infection is present, the malware begins encrypting files and folders on local drives, any attached drives, backup drives, and potentially other computers on the same network that the victim computer is attached to. Users and organizations are generally not aware they have been infected until they can no longer access their data or until they begin to see computer messages advising them of the attack and demands for a ransom payment in exchange for a decryption key. These messages include instructions on how to pay the ransom, usually with bitcoins because of the anonymity this virtual currency provides.

Ransomware attacks are not only proliferating, they’re becoming more sophisticated. Several years ago, ransomware was normally delivered through spam e-mails, but because e-mail systems got better at filtering out spam, cyber criminals turned to spear phishing e-mails targeting specific individuals.


And in newly identified instances of ransomware, some cyber criminals aren’t using e-mails at all. According to FBI Cyber Division Assistant Director James Trainor, “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers.”


The FBI doesn’t support paying a ransom in response to a ransomware attack. Said Trainor, “Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cyber criminals to target more organizations, it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.”


So what does the FBI recommend?

 As ransomware techniques and malware continue to evolve—and because it’s difficult to detect a ransomware compromise before it’s too late—organizations in particular should focus on two main areas:


–Prevention efforts—both in both in terms of awareness training for employees and robust technical prevention controls; and

–The creation of a solid business continuity plan in the event of a ransomware attack.


“There’s no one method or tool that will completely protect you or your organization from a ransomware attack,” said Trainor. “But contingency and remediation planning is crucial to business recovery and continuity—and these plans should be tested regularly.” In the meantime, according to Trainor, the FBI will continue working with its local, federal, international, and private sector partners to combat ransomware and other cyber threats.


If you think you or your organization have been the victim of ransomware, contact your local FBI field office and report the incident to the Bureau’s Internet Crime Complaint Center.