It is speculated that the U.S could have spent up to $7.5 billion in 2019. Once the ransom is paid, a passcode is sent to return stolen data.
The threat of someone accessing data in order to hold it for ransom increases when you receive an email with either a URL link or an attachment. Once the URL or attachment is clicked on, it opens up the door for someone to come in and take over.
The first line of defense is being cautious with emails.
Make sure you know who the email is from before you open anything you are sent.
This can be difficult especially at a place like Rose State College because so many people have access to college computers and devices. This increases the risk because more people are likely to click on something they should not.
OKC Public Schools were held ransom on May 13, 2019, which forced them to shut down the network temporarily.
The good news is that Rose State uses security software that helps stop any threats.
Rose State has many different layers of protection on the human side and the software side.
“Think of it like an onion,” said John Primo, Rose State vice president of information technology. “It takes a while to get to the center of an onion because of all the layers.”
Rose State has the ability to warn its staff and students of possible threats that may occur throughout the semester (through email) and educate them on what to look for so they are not attacked.
“One of the best defenses is education,” Primo said.
Rose State makes sure to back up their system regularly. So if the school is hacked; they can plug the hole, delete
the encrypted data and upload what has been backed up.
This is something experts recommend individuals do as well to make sure users never have to buy back their own
The key is education and caution. Do not be afraid to be skeptical.
If you are unsure the email you received is from who it says it is from, then double check. Take control of your