If you are trying to find out how to handle a ransom attack after you have been attacked, you are already way too late. Your options are very limited. Either pay or pray that the attackers were really stupid and try to recover the data by engaging a specialized consulting company. What you need to do is plan for this before you are attacked.
Business Email Compromise (BEC) happens when someone receives an email supposedly from their companies’ CFO, CEO or even their manager asking them to make a payment to a vendor account. In this attack, the person making the payment is socially engineered to make a fraudulent payment.
This article lists some of the things I have learned from my experiences at the various workplaces that I have been. Every person is different and I expect each person to understand and absorb the content differently. Hopefully, these points will help you be at your best.
In this article.. Reconnaissance Known Vulnerabilities SQL Injection Phishing Spear Phishing Malware Attacks Weak Authentication Conclusion There are so many news items about how this company got hacked or how someone hacked some government department. How do these attackers know…