{"id":1748,"date":"2022-02-10T00:20:57","date_gmt":"2022-02-10T07:20:57","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/?p=1748"},"modified":"2022-02-10T00:21:00","modified_gmt":"2022-02-10T07:21:00","slug":"remote-working-and-ransomware%ef%bf%bc","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/02\/10\/remote-working-and-ransomware%ef%bf%bc\/","title":{"rendered":"Remote working and Ransomware\ufffc"},"content":{"rendered":"\n<p>Remote working is not something new. Since the Covid19 pandemic started the diversity of remote learning is incomparable. There was always cyber security threat in remote working. However, it increased recently as people were forced to work from home to reduce the spread of virus it caused a rise in the new remote learning landscape, and Ransomware played an important role in this cyber threat push.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-ransomware-is\">What Ransomware is?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" data-src=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/1_d7tBImJLG_rzj-QbAoxrcg.png\" alt=\"\" class=\"wp-image-1749 lazyload\" width=\"700\" height=\"500\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/1_d7tBImJLG_rzj-QbAoxrcg.png 700w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/1_d7tBImJLG_rzj-QbAoxrcg-300x214.png 300w\" data-sizes=\"(max-width: 700px) 100vw, 700px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 700px; --smush-placeholder-aspect-ratio: 700\/500;\" \/><figcaption>Image credit:<a href=\"https:\/\/kirkpatrickprice.com\/blog\/why-is-ransomware-successful\/\">https:\/\/kirkpatrickprice.com\/blog\/why-is-ransomware-successful\/<\/a><\/figcaption><\/figure>\n\n\n\n<p>Ransomware is a type of malware from crypto virology that breach victims\u2019 data and block access for the victim and threaten the victim if a ransom is not paid.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-ransomware-work\">How does Ransomware work?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"820\" height=\"1000\" data-src=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/how-ransomware-works-infographic.jpeg\" alt=\"\" class=\"wp-image-1750 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/how-ransomware-works-infographic.jpeg 820w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/how-ransomware-works-infographic-246x300.jpeg 246w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/how-ransomware-works-infographic-768x937.jpeg 768w\" data-sizes=\"(max-width: 820px) 100vw, 820px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 820px; --smush-placeholder-aspect-ratio: 820\/1000;\" \/><figcaption>Image credit: <a href=\"https:\/\/www.acecloudhosting.com\/blog\/stay-safe-against-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.acecloudhosting.com\/blog\/stay-safe-against-ransomware\/<\/a><\/figcaption><\/figure>\n\n\n\n<p>Ransomware could happen in many ways. However, the most common one is phishing spam emails with an attachment. If the user opens the spam email the attachment will be downloaded into the user\u2019s system without the user\u2019s knowledge, then the malware will encrypt the victim\u2019s files and victims will be instructed to get the decryption upon payment.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-and-its-explosion-in-recent-years\">Ransomware and its explosion in recent years!<\/h2>\n\n\n\n<p>Ransomware has long posed a cybersecurity threat to remote working and recently it exploded because of Covid 19 pandemic. According to the global security group, the Institute for Security and Technology only in the US $350 was being given to hackers and it\u2019s a 311% increase over 2019.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"614\" data-src=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/4511-1024x614.jpeg\" alt=\"\" class=\"wp-image-1751 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/4511-1024x614.jpeg 1024w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/4511-300x180.jpeg 300w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/4511-768x461.jpeg 768w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/4511.jpeg 1240w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/614;\" \/><figcaption>Image credit: <a href=\"https:\/\/www.theguardian.com\/technology\/2021\/jun\/17\/ransomware-working-from-home-russia\" data-type=\"URL\" data-id=\"https:\/\/www.theguardian.com\/technology\/2021\/jun\/17\/ransomware-working-from-home-russia\">https:\/\/www.theguardian.com\/technology\/2021\/jun\/17\/ransomware-working-from-home-russia<\/a><\/figcaption><\/figure>\n\n\n\n<p>One of the most recent ransomware hacks happened because a company employee used a public network. By Which hacker breached into the private network and used remote employees IDs to connect with the company system which forced to shut down a colonial pipeline that used to supply 45% of the eastern United States\u2019 fuel.&nbsp;<\/p>\n\n\n\n<p>The hack of Twitter in 2020 was not for ransomware but the main breach point of this incident was remote working. Several employees were being called by the hacker and claimed to be IT department support and offered help to connect through the company\u2019s virtual private network being used by employees working from home. From this hack, the hacker was able to seize 117,000 bitcoins.&nbsp;<\/p>\n\n\n\n<p>We could say remote working is one of the reasons right now which increased the threat of cyber security and Ransomware is one the easiest way for this accomplishment of hackers\u2019.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-avoid-ransomware-and-remote-working-threat\">How to avoid Ransomware and Remote working threat?<\/h2>\n\n\n\n<ul class=\"wp-block-list\" type=\"1\"><li><strong>Wi-Fi:<\/strong><\/li><\/ul>\n\n\n\n<p>If an employee uses a home wireless network or public network that will give chance to the malicious actors nearby can easily spy on their connection and harvest confidential information. For this reason, employees should not use unknown Wi-Fi unless they are using VPN.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Password:<\/strong><\/li><\/ul>\n\n\n\n<p>Using a weak password is one of the reasons for being hacked in remote working. So, employees should practice using a stronger password with the randomly generated number. Moreover, they should practice using a password manager.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>File-Sharing:<\/strong><\/li><\/ul>\n\n\n\n<p>Employees should practice sharing unencrypted data. Companies may be thinking they are because their encrypted data are stored in their server. While The company information can be theft when encrypting data in transit from one place to another.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Email Scam<\/strong>:&nbsp;<\/li><\/ul>\n\n\n\n<p>If any email scam occurred companies should be responsible for that  because when remote working started most of the employees did not have enough training and Idea about remote learning. So companies should do a workshop to prevent this situation and educate their employees about cyber security and its threat.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Work from home security policy:<\/strong>&nbsp;<\/li><\/ul>\n\n\n\n<p>\u00b7 Clearly state that which positions are eligible for remote work.<\/p>\n\n\n\n<p>\u00b7 List the tools and platforms they should be using.<\/p>\n\n\n\n<p>\u00b7 Give guidelines to the employees to follow steps if they have been compromised. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"references\">References:<\/h2>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><a href=\"https:\/\/link-springer-com.ezproxy.lib.ucalgary.ca\/chapter\/10.1007%2F978-3-030-78645-8_74\">https:\/\/link-springer-com.ezproxy.lib.ucalgary.ca\/chapter\/10.1007%2F978-3-030-78645-8_74<\/a><\/li><li><a href=\"https:\/\/www.theguardian.com\/technology\/2021\/jun\/17\/ransomware-working-from-home-russia\">https:\/\/www.theguardian.com\/technology\/2021\/jun\/17\/ransomware-working-from-home-russia<\/a><\/li><li><a href=\"https:\/\/heimdalsecurity.com\/blog\/cybersecurity-issues-with-remote-work\/\">https:\/\/heimdalsecurity.com\/blog\/cybersecurity-issues-with-remote-work\/<\/a><\/li><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Ransomware\">https:\/\/en.wikipedia.org\/wiki\/Ransomware<\/a><\/li><li><a href=\"https:\/\/www.csoonline.com\/article\/3236183\/what-is-ransomware-how-it-works-and-how-to-remove-it.html\">https:\/\/www.csoonline.com\/article\/3236183\/what-is-ransomware-how-it-works-and-how-to-remove-it.html<\/a><\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Remote working is not something new. Since the Covid19 pandemic started the diversity of remote learning is incomparable. There was always cyber security threat in remote working. However, it increased recently as people were forced to work from home to reduce the spread of virus it caused a rise in the new remote learning landscape, &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/02\/10\/remote-working-and-ransomware%ef%bf%bc\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Remote working and Ransomware\ufffc&#8221;<\/span><\/a><\/p>\n","protected":false},"author":340,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1748","post","type-post","status-publish","format-standard","hentry","category-cpsc-329-602-w22","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Kamrul Ahsan Noor","author_link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/author\/kamrul-ahsan-noor\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/users\/340"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/comments?post=1748"}],"version-history":[{"count":2,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1748\/revisions"}],"predecessor-version":[{"id":1777,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1748\/revisions\/1777"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/media?parent=1748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/categories?post=1748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/tags?post=1748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}