What You Need to Know & How to Protect Against NotPetya Ransomware

iStock-597257986.jpg

A form of ransomware dubbed NotPetya is currently spreading around the world. Ransomware is a growing threat. Just a couple of months ago a strain called WannaCry crippled the British National Health Service for several days. And now NotPetya is infecting computers with relative impunity. So here’s everything you need to know about the NotPetya ransomware. 

What is Ransomware?

Ransomware can:

  • Prevent you from accessing Windows.

  • Encrypt files so you can't use them.

  • Stop certain apps from running (like your web browser).

Ransomware will demand that you pay money (a “ransom”) to get access to your PC or files. We have also seen them make you complete surveys.

There is no guarantee that paying the fine or doing what the ransomware tells you will give access to your PC or files again.

Do Not Open Or Reply to Suspicious Emails!

What Is NotPetya?

NotPetya is a new strain of ransomware that hasn’t been seen before. It works in much the same way as any other form of ransomware, encrypting all of your files and asking for a ransom to release them. The ransom in this case being $300 worth of Bitcoin.

6 Ways to Prevent a Ransomware Attack

Update, Update, Update: Keep on top of updates for your antivirus and other applications. Do not ignore familiar updates!

Check Your Backup: Ensure your critical files are being backed often, preferably offsite, in case you do get infected. Files saved to an attached USB drive or another location on your network are still vulnerable!

Beware of Popups: Immediately close popups that ask you to update your account information or install applications you did not specifically request. 

Stay Vigilant: If it sounds too good to be true, it is. Stick with trusted sites and don't fall victim to cams (like "You're a Winner!" banners). Be aware of email attachments: ransomware commonly comes in the form of a bogus shipping receipt.

Listen to Your Antivirus: If you get a warning from your antivirus about a possible threat, don't dismiss it. Report it to your support team, with lots of details!

Bookmark Your Favorites: Hackers often create pages with names very close to commonly used sites (Gogle.com, for example). Save your most-used websites to avoid typing the wrong address and ending up somewhere you don't want to be. 

New Call-to-action

Topics: ransomware

View the original article from Make Use Of  

Have technology questions or want to learn more about how Tech Impact can help your nonprofit? Give us a call 1-888-798-1350 or browse our Technology Services For Nonprofits.


Tech Impact provides hands-on technology support to nonprofits. Learn More