{"id":23698,"date":"2023-10-24T15:42:38","date_gmt":"2023-10-24T19:42:38","guid":{"rendered":"https:\/\/www.montclair.edu\/information-technology\/?p=23698"},"modified":"2023-10-24T15:42:38","modified_gmt":"2023-10-24T19:42:38","slug":"wanted-ransomwolf-national-cyber-security-awareness-month","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/information-technology\/2023\/10\/24\/wanted-ransomwolf-national-cyber-security-awareness-month\/","title":{"rendered":"Wanted: Ransomwolf (National Cyber Security Awareness Month)"},"content":{"rendered":"<p><strong>Description<\/strong>:\u00a0Lurking in that innocent looking file attachment you just downloaded, Ransomwolf is ready to gobble up all your important information, bounding from folder to folder and encrypting files as he goes. Unlike other werewolves, Ransomwolf is invulnerable\u00a0to &#8220;silver bullets.&#8221;\u00a0Take\u00a0<a rel=\"noopener\" href=\"https:\/\/www.montclair.edu\/information-technology\/security\/phishing-information\/#identify-phishing-attack\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.montclair.edu\/information-technology\/security\/phishing-information\/%23identify-phishing-attack&amp;source=gmail&amp;ust=1698262814239000&amp;usg=AOvVaw2Mb1uqgumfMgIlmRBzjy2l\">extra caution with file attachments (don&#8217;t open anything you are not expecting), be vigilant to potential phishing emails<\/a>, and make regular backups of important files. (Be sure any backup media is properly protected and stored in a secure place too.)<\/p>\n<p><strong>Targets:<\/strong>\u00a0Users that are not\u00a0<a rel=\"noopener\" href=\"https:\/\/www.montclair.edu\/information-technology\/security\/cybersecurity-awareness-training\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.montclair.edu\/information-technology\/security\/cybersecurity-awareness-training\/&amp;source=gmail&amp;ust=1698262814239000&amp;usg=AOvVaw3MSGUWp6JnAoqP5w2aOnz0\">cyber security aware<\/a>, devices with\u00a0outdated virus &amp; malware protection, distracted users<\/p>\n<p><strong>Monster&#8217;s Weaknesses:\u00a0<\/strong>Well-informed and aware users, regular file backups, dog biscuits<\/p>\n<p><strong>Bonus tip<\/strong>: Always use the &#8220;<em>hover over<\/em>&#8221; technique to check web links before clicking! To learn how, go to:\u00a0<a rel=\"noopener\" href=\"https:\/\/www.montclair.edu\/information-technology\/security\/security-tips\/#hover-over\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.montclair.edu\/information-technology\/security\/security-tips\/%23hover-over&amp;source=gmail&amp;ust=1698262814239000&amp;usg=AOvVaw2jhSwWgySM_varIhQMXKCk\">www.montclair.edu\/information-technology\/security\/security-tips\/#hover-over<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description:\u00a0Lurking in that innocent looking file attachment you just downloaded, Ransomwolf is ready to gobble up all your important information, bounding from folder to folder and encrypting files as he goes. Unlike other werewolves, Ransomwolf is invulnerable\u00a0to &#8220;silver bullets.&#8221;\u00a0Take\u00a0extra caution with file attachments (don&#8217;t open anything you are not expecting), be vigilant to potential phishing [&hellip;]<\/p>\n","protected":false},"author":368,"featured_media":23699,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[69,34],"class_list":["post-23698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-information-security","tag-security"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/23698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/users\/368"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=23698"}],"version-history":[{"count":1,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/23698\/revisions"}],"predecessor-version":[{"id":23700,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/23698\/revisions\/23700"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media\/23699"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=23698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/categories?post=23698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/tags?post=23698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}