{"id":7738,"date":"2022-09-29T08:45:08","date_gmt":"2022-09-29T12:45:08","guid":{"rendered":"https:\/\/prolifics.com\/us\/?p=7734"},"modified":"2025-09-18T12:23:19","modified_gmt":"2025-09-18T06:53:19","slug":"stay-safe-look-out-for-ransomware-and-phishing","status":"publish","type":"post","link":"https:\/\/prolifics.com\/usa\/resource-center\/blog\/stay-safe-look-out-for-ransomware-and-phishing","title":{"rendered":"Stay Safe: Look Out for Ransomware and Phishing"},"content":{"rendered":"<p><strong>By Ranga Yarlagadda <\/strong><br \/>Deputy General Manager- Global IT at Prolifics <\/p>\n<p>There are a lot of different cyber-attacks that people are unaware of. Here are two of the most common:&nbsp;<\/p>\n<p><strong>Ransomware <\/strong>and phishing are methods hackers use to extort money online. Ransomware is a type of malicious software that prevents you from accessing your computer until you pay a ransom.<\/p>\n<p><strong>Phishing <\/strong>is when the sender of an email will ask you to perform specific actions to gain access to your computer.\u00a0\u00a0<\/p>\n<p>Emails are the most common method of attack. These emails will often contain malicious links or seemingly harmless attachments. To avoid becoming a victim, please make sure to do the following:&nbsp;<\/p>\n<ul>\n<li>Verify the sender\u2019s email address is legitimate and familiar before responding.\u00a0<\/li>\n<li>Avoid responding to emails from senders with suspicious domain or display names.\u00a0<\/li>\n<li>Do not click on links or attachments from senders that you do not recognize (be especially wary of .zip, .7z, or other compressed or executable file types).\u00a0<\/li>\n<li>Do not share sensitive or personal information through email (e.g. usernames and passwords).\u00a0<\/li>\n<li>Inspect URLs carefully to make sure they\u2019re legitimate and not imposter sites.\u00a0<\/li>\n<li>Do not open any shared documents that you\u2019re not expecting.\u00a0<\/li>\n<li>If this happens in a company setting, follow your company\u2019s reporting procedures or contact your IT department.\u00a0\u00a0<\/li>\n<\/ul>\n<p>We hope this information is helpful, and wish you continued safety online!&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a lot of different cyber-attacks that people are unaware of. Here are two of the most common<\/p>\n","protected":false},"author":34,"featured_media":30054,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[49],"tags":[],"class_list":["post-7738","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"acf":[],"builder_content":"","_links":{"self":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts\/7738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/comments?post=7738"}],"version-history":[{"count":0,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts\/7738\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/media\/30054"}],"wp:attachment":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/media?parent=7738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/categories?post=7738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/tags?post=7738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}