10 Critical Steps to Survive a Ransomware Attack, Step 5: Restrict Attachments

First off, if you did not request it, don’t open it. In the last two months, we’ve worked with three Vice President and higher executives who said exactly this: “I received an attachment from someone I didn’t know, and I wanted to see what it was.” Curiosity killed the cat… and the VP’s computer. The … Continue reading 10 Critical Steps to Survive a Ransomware Attack, Step 5: Restrict Attachments