Are you sure you would like to cancel your request to attend Ontario’s
Managing Digital Risks in the Broader Public Sector
Êtes-vous certain(e) de vouloir annuler votre demande d’inscription à la conférence
Gérer les risques numériques dans le secteur parapublic de
You will no longer be registered for this event, and will no longer receive
communications from us.
If you opted to attend in-person, your name will be removed from the list.
If you have already received the virtual attendance link, you will still be able
to access the conference virtually.
Please note that you are unable to re-register for the in-person portion of the
conference online. If you would like to re-register, or if you have any further
inquiries, please contact email@example.com.
Ontario’s Cyber Security Education & Centre of Excellence Team
Vous n’êtes plus inscrit à cet événement et ne recevrez plus de communications
de notre part.
Si vous aviez choisi de participer en personne, votre nom sera supprimé de la
Si vous avez déjà reçu le lien de participation virtuelle, vous pourrez quand
même accéder à la conférence de façon virtuelle.
Veuillez noter que vous ne pouvez pas vous inscrire de nouveau en ligne au volet
en personne de la conférence. Si vous souhaitez vous inscrire de nouveau ou si
vous avez d’autres questions, veuillez communiquer avec firstname.lastname@example.org.
Équipe du Centre d’excellence et de formation de l’Ontario pour la cybersécurité
You have requested to attend the Managing Digital Risks in the Broader Public Sector conference
Your status for the Managing Digital Risks in the Broader Public Sector conference is
Approved Pending Approval Waitlisted Cancelled Denied
Ransomware is a type of malware that makes data inaccessible. When ransomware infects a device, it will either lock your screen or encrypt all your files. It may be contained to a single device but can also make the data of an entire organization inaccessible. Once the files are inaccessible the threat actor will send you a message indicating the ransom that must be paid in order to regain access to your files. This payment is typically requested in cryptocurrency as it is harder to track. The threat actor may also threaten to leak private information or threaten your clients directly if you do not pay right away.
How to protect yourself
A cyber criminal must be able to gain access to your system prior to initiating a ransomware attack. Follow these best practices to keep cyber criminals out of your systems and devices.
It is important to back up your data regularly. You can back up your data on an external hard drive or on the cloud. If your data is encrypted by a ransomware attack, you can recover your data by using your backup.
What to do if you fall victim
If you think that you may have been the victim of a ransomware attack, take these steps:
Tell your organization’s cyber security team.
Remove the malware from your device(s). If you are unable to do so yourself, get assistance from a cyber security professional.
Restore your systems with your data backup.
Change all passwords to online accounts.
Double- and triple-extortion ransomware
Traditional ransomware attacks only demand payment to decrypt the files. Recent ransomware attacks are more complex. In double-extortion ransomware attacks, the threat actors demand a ransom and threaten to leak private information. In triple-extortion ransomware attacks, the threat actor demands a ransom payment, threatens to leak private information, and sends ransom demands to the users or customers of the impacted institution.