1. Which of the following is NOT a known way Ransomware can infect your company’s infrastructure? Do you know how Ransomware works? Ransomware enters your infrastructure from a single source and spreads to every file it can get its hands on. It then encrypts all your files and demands a ransom of hundreds or thousands of dollars (usually involving bitcoin) to unlock your files. NexusTek offers a Ransomware Mitigation solution - Find out more here: Vulnerability Assessment Through an attachment in an email made to look like an invoice Through a USB Flashdrive Via a link posted on Facebook From an incoming phone call None 2. If you try to open a Microsoft Excel document that you frequently use and it says that the file is corrupted, what should you do first? Ransomware affects a multitude of businesses on a daily basis. There are forms of Ransomware that can enter through one workstation and infect an entire company’s file share in no time at all. How secure are you? NexusTek offers a Ransomware Mitigation solution - Find out more here: Network Security Email your Microsoft Excel document to your personal email address to see you can open it from your personal computer Run a virus scan Disconnect your machine from the internet and shut it down Call your IT company None 3. If your data was compromised by a Ransomware virus, what is the quickest and safest way to restore that data? Do you backup your data? There are many ways to back up your data…they range from copying all your files periodically to an external source to having your data automatically backed up to the cloud and managed for you. NexusTek can provide you with a state-of-the-art Backup solution - Find out more here: Business Continuity Restart your computer Restore all your data from your backups Do a full check of your entire infrastructure and remove all traces of the virus. Then restore your data from a Cloud-based backup Pay the ransom to remove the virus None 4. What are some ways Hackers can enter your IT infrastructure? “Hacker” seems like a term from an old 90’s movie. Believe it or not, Hackers are still out there and smarter than ever. They could be individuals from another country or even someone you know. NexusTek has programs that not only solve all your IT needs but provides an enterprise level Antivirus included? Find out more here: Virus Protection Remote access through an outdated corporate VPN Through a firewall that was installed 7 years ago Internal User (an employee) All of the above Answers 1 & 2 None 5. What are some ways a hacker can get a person’s sensitive data from a cell phone? Cell phones…the next frontier of security threats. They’re devices that have microphones, video, our passwords, credit card info, contacts, etc… and many organizations do not track or manage their mobile devices like they would their laptops. NexusTek has a Mobile Device Management program - find out more here: Mobile Security By connecting to a guest WIFI By making a call to your best friend from a public location By installing an app you found in the app store All of the above Answers 1 & 3 None Name Email Time's up