TRA offers essential info on wannacry ransomware

UAE's TRA offers tips on avoiding ransomware
Essential, Information, Ransomware, TRA, Virus, Wannacry

Share

The UAE's TRA offers key information and advice on cyber security in the wake of the global 'wannacry' virus.

 

• What is the this virus:

It is a malicious program that affects smart phones and computers, encrypts and locks their data so that it can not be accessed until payment is made.

 

• How can the virus  penetrate you?

1. The victim receives a message or link from an anonymous person, the content of the link is a file containing malicious software.

2. The sender tempts the victim to download the file by deceiving him that the message contains important or personal files.

3. The user uploads the file to his or her smartphone.

4. The virus encrypts important data in the device or encrypts the entire device, so that the user can not access his data.

5. The offender asks the victim for money / a "ransom" in exchange for the decoding of the data and returning it to its nature.

 

How do you reduce your risk of exposure to this virus?

- Make sure to back up your device data constantly, to recover it if you are infected with the virus.

- Avoid opening links from unknown sources, and do not upload files sent by anonymous people via e-mail.

- Use anti-virus software and make sure it's original, and update it constantly

- Update the operating system of your phone and PC continuously, and be sure to update the software in it.

- Avoid access to suspicious sites

- Be sure to download software and applications from their official sources and avoid pirated programs

 

What to do if your computer gets infected with the virus

- Avoid obeying them. If you pay the required amount, they will continue to extort and ask for more money.

 

What to do if your computer is infected with the virus

• Avoid obeying them, if you pay the amount required, they will continue to blackmail you and they'll ask for more money.

• If the affected device is affiliated to your organization, inform the IT department directly.

• If the affected device is your personal computer, take it to the authorized dealer.

• Stop operations on the device or network directly and restore the backup .

 

REGISTER NOW | Webinar Event | Security you can bank on – Safeguarding the Middle East’s financial sector

Presented in partnership with security and network specialist Cybereason, the second in the three part webinar series will bring together a panel of experts to discuss how banks and financial institutions are evolving their service offering while simultaneously staying one step ahead of the cyber criminals who seek to bring their operations crashing to the ground.

Editor's Choice

Emerson expands analytics platform for industrial enterprise-level wireless infrastructure management
Plantweb Insight platform adds two new Pervasive Sensing applications that manage wireless networks more efficiently with a singular interface to the enterprise
Digitalisation seen as a competitive advantage by Middle East private businesses
Nearly 80 per cent of private business leaders acknowledge that digitalisation can impact business sustainability
Etisalat introduces Multi-Access Edge Computing architecture delivering best-in-class video streaming performance for 5G networks
MEC architecture achieves performance gains of as much as 90% in video streaming, validating how ultra-low-latency applications will be delivered over 4G and 5G networks

Most popular

Don't Miss a Story