{"id":575700,"date":"2026-01-27T14:33:21","date_gmt":"2026-01-27T17:33:21","guid":{"rendered":"https:\/\/revistapesquisa.fapesp.br\/?p=575700"},"modified":"2026-01-27T14:33:21","modified_gmt":"2026-01-27T17:33:21","slug":"protecting-yourself-against-cyber-attacks","status":"publish","type":"post","link":"https:\/\/revistapesquisa.fapesp.br\/en\/protecting-yourself-against-cyber-attacks\/","title":{"rendered":"Protecting yourself against cyber attacks"},"content":{"rendered":"<div id=\"attachment_575706\" style=\"max-width: 810px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-575706 size-full\" src=\"https:\/\/revistapesquisa.fapesp.br\/wp-content\/uploads\/2026\/01\/RPF-notas-ataques-ciber-2025-10-800.jpg\" alt=\"\" width=\"800\" height=\"1000\" srcset=\"https:\/\/revistapesquisa.fapesp.br\/wp-content\/uploads\/2026\/01\/RPF-notas-ataques-ciber-2025-10-800.jpg 800w, https:\/\/revistapesquisa.fapesp.br\/wp-content\/uploads\/2026\/01\/RPF-notas-ataques-ciber-2025-10-800-250x313.jpg 250w, https:\/\/revistapesquisa.fapesp.br\/wp-content\/uploads\/2026\/01\/RPF-notas-ataques-ciber-2025-10-800-700x875.jpg 700w, https:\/\/revistapesquisa.fapesp.br\/wp-content\/uploads\/2026\/01\/RPF-notas-ataques-ciber-2025-10-800-120x150.jpg 120w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><p class=\"wp-caption-text\"><span class=\"media-credits-inline\">Sora-Shimazaki \/ Pexels<\/span>Keeping backups helps avoid damage from malicious computer programs<span class=\"media-credits\">Sora-Shimazaki \/ Pexels<\/span><\/p><\/div>\n<p>What should you do if your computer is subject to a ransomware attack, in which data and accounts are held hostage in return for a payment? \u201cYou must act quickly to contain the spread, remove the attacker\u2019s presence, eradicate the root cause of the intrusion, restore the environment, and resume normal operations,\u201d recommends the newly released guide <em>Ransomware: How to Protect Yourself<\/em>, issued by Brazil\u2019s Center for Security Incident Studies and Response (CERT.br). Aimed primarily at small and medium-sized businesses, the guide outlines essential preventive measures, such as protecting backups, identifying vulnerabilities, and separating user networks to prevent data loss. &#8220;Failure to remove malware [programs designed to cause harm, such as viruses], eliminate access points used by the attacker, or fix vulnerabilities exploited by the attacker can lead to further attacks and damage,\u201d the document warns (<em>see <\/em>Pesquisa FAPESP <em>issues <a href=\"https:\/\/revistapesquisa.fapesp.br\/en\/more-barriers-to-prevent-cyberattacks\/\" target=\"_blank\" rel=\"noopener\">327<\/a> and <a href=\"https:\/\/revistapesquisa.fapesp.br\/en\/cyberattacks-on-universities-and-scientific-institutions-on-the-rise-in-brazil\/\" target=\"_blank\" rel=\"noopener\">352<\/a><\/em>). The free guide is available at <a href=\"https:\/\/cert.br\/docs\/ransomware\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cert.br\/docs\/ransomware\/<\/a> (CERT.br, July 28).<\/p>\n","protected":false},"excerpt":{"rendered":"Making backups is a key measure against virus attacks","protected":false},"author":475,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[1651],"tags":[219,2413],"coauthors":[785],"class_list":["post-575700","post","type-post","status-publish","format-standard","hentry","category-notes","tag-computation","tag-technology"],"acf":[],"_links":{"self":[{"href":"https:\/\/revistapesquisa.fapesp.br\/en\/wp-json\/wp\/v2\/posts\/575700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/revistapesquisa.fapesp.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/revistapesquisa.fapesp.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/revistapesquisa.fapesp.br\/en\/wp-json\/wp\/v2\/users\/475"}],"replies":[{"embeddable":true,"href":"https:\/\/revistapesquisa.fapesp.br\/en\/wp-json\/wp\/v2\/comments?post=575700"}],"version-history":[{"count":1,"href":"https:\/\/revistapesquisa.fapesp.br\/en\/wp-json\/wp\/v2\/posts\/575700\/revisions"}],"predecessor-version":[{"id":575711,"href":"https:\/\/revistapesquisa.fapesp.br\/en\/wp-json\/wp\/v2\/posts\/575700\/revisions\/575711"}],"wp:attachment":[{"href":"https:\/\/revistapesquisa.fapesp.br\/en\/wp-json\/wp\/v2\/media?parent=575700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/revistapesquisa.fapesp.br\/en\/wp-json\/wp\/v2\/categories?post=575700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/revistapesquisa.fapesp.br\/en\/wp-json\/wp\/v2\/tags?post=575700"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/revistapesquisa.fapesp.br\/en\/wp-json\/wp\/v2\/coauthors?post=575700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}