Properly protect my computer from Ransomware
- If you receive a Ransomware popup or message on your device alerting you to an infection, immediately disconnect from the Internet (wifi or unplug wall connection) and external drives to avoid any additional infections or data losses.
- Report the incident to IT Service Desk - http://it.ucsf.edu/how_do/report-security-incident.
- Always use antivirus software and a firewall. It's important to obtain and use antivirus software and firewalls from reputable companies. It's also important to continually maintain both of these through automatic updates.
- UCSF IT provides client security software (anti-virus and firewall in one) free of charge to UCSF faculty, staff, students, and researchers: http://software.ucsf.edu
- Maintain a current patch level for any operating systems and applications.
- Enable popup blockers. Popups are regularly used by criminals to spread malicious software. To avoid accidental clicks on or within popups, it's best to prevent them from appearing in the first place.
- Safari - https://support.apple.com/en-us/HT203987
- Internet Explorer - https://support.microsoft.com/windows
- Google Chrome - https://support.google.com/chrome/answer/95472?hl=en
- Mozilla Firefox - https://support.mozilla.org/en-US/kb/pop-blocker-settings-exceptions-tro...
- Always back up the content on your computer. If you back up, verify, and maintain offline copies of your personal and application data, Ransomware scams will have limited impact on you. If you are targeted, instead of worrying about paying a ransom to get your data back, you can simply have your system wiped clean and then reload your files.
- Back up service (CrashPlan Pro) is offered at no additional charge, to all ITFS supported desktops and laptops as part of the ITFS Basic Support, and to UCSF Medical Center supported laptops - https://it.ucsf.edu/services/crashplan
- Exercise caution. Don’t click on links inside emails, and avoid suspicious websites. If your PC does come under attack, use another computer to research details about the type of attack. But be aware that the bad guys are devious enough to create fake sites, perhaps touting their own fake antivirus software or their de-encryption program.
- Symantec’s Blog - https://www.symantec.com/connect/blogs/ransomware-dos-and-donts-protecting-critical-data
- Microsoft Malware Protection Center - https://www.microsoft.com/security/portal/mmpc/shared/ransomware.aspx