{"id":5816,"date":"2016-05-03T13:45:24","date_gmt":"2016-05-03T16:45:24","guid":{"rendered":"https:\/\/ostec.blog\/generico\/ransomware-como-se-proteger"},"modified":"2020-11-24T15:27:58","modified_gmt":"2020-11-24T18:27:58","slug":"ransomware-how-to-protect","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/","title":{"rendered":"Ransomware: Understand what it is"},"content":{"rendered":"<p class=\"FirstParagraph\">A variant of malware has been drowsy in recent years by various network administrators, security professionals, and business owners with little technology expertise.<\/p>\n<p class=\"FirstParagraph\"><b>Ransomware<\/b>is a type of malware with the purpose of sequestration of data aiming the request of rescue to release them. This is because it is in the nature of this threat to encrypt files and folders on users&#8217; operating systems, preventing access to them, as long as the requested redemption is not paid.<\/p>\n<p class=\"FirstParagraph\">In this way, through a very strong encryption strategy, data used by certain applications, such as database, configuration file, or even common files such as documents, spreadsheets and so on, are encrypted and impossible to read.<\/p>\n<p class=\"FirstParagraph\">To release the data the attackers require payment of certain amounts, usually paid in the bitcoin virtual currency, whose traceability is highly complex, protecting anonymity as well as encouraging malicious people to carry out, or even contract, the attack as a service (RaaS &#8211; <b>Ransomware<\/b>as a Service) at Deep web.<\/p>\n<p class=\"FirstParagraph\">In the event of database hijacking (<b>Ransomware<\/b>), it is not recommended to make payment requested by the attacker, since there is no guarantee that the data will actually be released. The best way is to create a basic set of measures that minimize not only the attack, but also especially its reflection within organizations.<\/p>\n<p class=\"FirstParagraph\">We have created an e-book with <a href=\"http:\/\/content.ostec.com.br\/ebook-5-tips-to-avoid-ransomware\"><b>5 fundamental tips to avoid the occurrence of this type of sinister in organizations<\/b><\/a>. In this e-book, you will know a little more about <b>Ransomware<\/b>and verify how your company can build a structure to minimize the possibility of occurrence of this type of attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A variant of malware has been drowsy in recent years by various network administrators, security professionals, and business owners with little technology expertise. Ransomwareis a type of malware with the purpose of sequestration of data aiming the request of rescue to release them. This is because it is in the nature of this threat to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12847,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984,988,992,411],"tags":[1641,1667],"class_list":["post-5816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-information-loss-or-leakage","category-learning-and-discovery","category-perimeter","tag-ransomware-en","tag-sequestro-dados-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware: Understand what it is - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: Understand what it is - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"A variant of malware has been drowsy in recent years by various network administrators, security professionals, and business owners with little technology expertise. Ransomwareis a type of malware with the purpose of sequestration of data aiming the request of rescue to release them. This is because it is in the nature of this threat to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-03T16:45:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-24T18:27:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Labbo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/\"},\"author\":{\"name\":\"Labbo\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\"},\"headline\":\"Ransomware: Understand what it is\",\"datePublished\":\"2016-05-03T16:45:24+00:00\",\"dateModified\":\"2020-11-24T18:27:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/\"},\"wordCount\":270,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg\",\"keywords\":[\"Ransomware\",\"sequestro dados\"],\"articleSection\":[\"General\",\"Information loss or leakage\",\"Learning and discovery\",\"Perimeter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/\",\"url\":\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/\",\"name\":\"Ransomware: Understand what it is - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg\",\"datePublished\":\"2016-05-03T16:45:24+00:00\",\"dateModified\":\"2020-11-24T18:27:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg\",\"width\":928,\"height\":534,\"caption\":\"Caveira feita com palaras utilizadas em linguagem de programa\u00e7\u00e3o. A caveira representa um ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: Understand what it is\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\",\"name\":\"Labbo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"caption\":\"Labbo\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/labbo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: Understand what it is - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: Understand what it is - OSTEC | Seguran\u00e7a digital de resultados","og_description":"A variant of malware has been drowsy in recent years by various network administrators, security professionals, and business owners with little technology expertise. Ransomwareis a type of malware with the purpose of sequestration of data aiming the request of rescue to release them. This is because it is in the nature of this threat to [&hellip;]","og_url":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2016-05-03T16:45:24+00:00","article_modified_time":"2020-11-24T18:27:58+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg","type":"image\/jpeg"}],"author":"Labbo","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/"},"author":{"name":"Labbo","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f"},"headline":"Ransomware: Understand what it is","datePublished":"2016-05-03T16:45:24+00:00","dateModified":"2020-11-24T18:27:58+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/"},"wordCount":270,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg","keywords":["Ransomware","sequestro dados"],"articleSection":["General","Information loss or leakage","Learning and discovery","Perimeter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/","url":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/","name":"Ransomware: Understand what it is - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg","datePublished":"2016-05-03T16:45:24+00:00","dateModified":"2020-11-24T18:27:58+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg","width":928,"height":534,"caption":"Caveira feita com palaras utilizadas em linguagem de programa\u00e7\u00e3o. A caveira representa um ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/perimeter\/ransomware-how-to-protect\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"Ransomware: Understand what it is"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f","name":"Labbo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","caption":"Labbo"},"url":"https:\/\/ostec.blog\/en\/author\/labbo\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=5816"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5816\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/12847"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=5816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=5816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=5816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}