Ransomware 2 – Examples of Ransomware

An eye with the word Ransomware and #2 written in front of it.

Crime doesn’t pay, as the saying goes—at least that’s how the saying used to go. In the good old days, criminals had to be physically present to rob you, which meant the risk often outweighed the reward.

But the digital crime of today is a different story. This crime doesn’t involve guns or in-person hold-ups—it involves things we do every day, like opening emails, answering phone calls, or logging on to social media platforms. Worst of all, digital crime is increasingly targeting honest, hardworking independent grocers through ransomware, which means one simple mistake, and your POS system or other important data could be held hostage for a mind-boggling ransom.

This course will cover the basics, examples and ways to avoid ransomware within your organization.

This course has the following objectives:

Videos in course:

• Examples of Ransomware
• Ransomware of Hardware
• Ransomware and Best Practices
• Training for Ransomware
• Email/Voicemail/Phone Warning Signs

Course Duration: 13m

Ransomware 2 – Examples of Ransomware

An eye with the word Ransomware and #2 written in front of it.

Crime doesn’t pay, as the saying goes—at least that’s how the saying used to go. In the good old days, criminals had to be physically present to rob you, which meant the risk often outweighed the reward.

But the digital crime of today is a different story. This crime doesn’t involve guns or in-person hold-ups—it involves things we do every day, like opening emails, answering phone calls, or logging on to social media platforms. Worst of all, digital crime is increasingly targeting honest, hardworking independent grocers through ransomware, which means one simple mistake, and your POS system or other important data could be held hostage for a mind-boggling ransom.

This course will cover the basics, examples and ways to avoid ransomware within your organization.

This course has the following objectives:

Videos in course:

• Examples of Ransomware
• Ransomware of Hardware
• Ransomware and Best Practices
• Training for Ransomware
• Email/Voicemail/Phone Warning Signs

Course Duration: 13m