preview

Nt1330 Unit 3 Assignment 1

Decent Essays

At my place of employment, the IT department sends out emails anytime numerous incoming spam emails are detected. When IT noticed the “invoice” emails coming in, an email was sent to all users with a warning not to open any attachments if they were not expected. Users were further instructed that if an attachment was opened in error, not to download macros even if prompted to. Unfortunately, there were a few people who did just that and subsequently infected their computers. When IT received an alert that a virus had been detected, they confiscate the computer, re-image it, and restore any files that are backed up. This would be the end of the issue until another virus was downloaded. Locky, unlike previous ransomware viruses, attacks more …show more content…

They can give in and follow the links and directions to pay the ransom, or they can try to recover the files themselves. If a user decides to pay the ransom they must pay with bitcoins. At this time one bitcoin is worth $400. Locky authors are charging 0.5 to 1.00, $200 to $400, bitcoins to have access to the original files. In order to purchase bitcoins, a bitcoin account must be created. This account connects to a method of payment for someone to purchase the number of bitcoins desired. Once the user has purchased the bitcoins they follow the instructions and pay. If the files have been backed up the user can remove the virus by various methods, and replace the encrypted files. Currently there is at least one program with which a victim can attempt to recover the encrypted files called …show more content…

• Back up files stored on your computer regularly
• Have security software installed on your computer and kept up to date
• Keep the operating system and other software programs updated
• Ensure all patches are installed if software is not kept up to date
• Treat emails with caution if they contain attachments. Delete or spam any suspicious emails.
• Educate other email users about email risk such as not opening attachments unless they know who sent them and they were expecting the attachment
• Be very cautious of emails that ask to have macros enabled
• If macros will not be needed, disable them.
If macros cannot be disabled, an alternative is provided in an article by Nadia Kovacs. “If you are unable to disable macros, you can also try using Word Viewer by Microsoft. Word viewer will allow you to view a Microsoft document, however, it does not support macros, therefore will not run

Get Access