Skip to content

Weekly Feature

The NIST Cybersecurity Framework:

Newsletters

6 Free Ransomware Decryption Tools

Ransomware is malware that attacks a computer system by locating and encrypting files stored on that computer. The ransomware will then alert the user of the encryption, usually via a ransom note in the form of a pop-up window or a ransom note located with the encrypted files. The ransom note instructs the user to pay the ransom, usually in the form of Bitcoin, in order to decrypt and recover their files. Unfortunately, paying a ransom is no guarantee that the files will be unencrypted.  Ransomware usually is activated by an unsuspecting user that received it in the form of an email attachment or as a link in an email.  

The best defense against ransomware attacks is to avoid opening emails from sources you don’t know. Get educated about ransomware and how to avoid it. Make sure your IT systems have backups and that files stored on those systems are backed up as well. If you have been the victim of a ransomware attack there are free tools available that may assist with decrypting the files the ransomware encrypted. More information...

Introduction to Critical Security Controls (CSCs) for Effective Cyber Defense

The Governor of the State of Idaho has officially adopted the use of the Critical Security Controls to improve cybersecurity for the State executive agencies.  The Critical Security Controls (CSCs) are an excellent method for implementing cyber defense.  Learn how your organization can benefit from using the CSCs:

Welcome to the Critical Security Controls

Frequently Asked Questions about Critical Security Controls

Critical Security Controls Handout

Critical Security Controls Master Document

Your device does not support flash.

dhslogoibhs_logo_fnlmsisacstopthinkconnect