This has the potential to make all files on your network unusable, so it is very serious.
Here is a safe link that provides details:
CNP recommends the following actions to protect your network and its data, please share with your employees and contact your CNP Team or account representative if you have any questions.
- Have a reliable backup mechanism and test it monthly as part of a disaster recovery plan. Once infected with Cryptolocker, the only resolution is to delete the files and restore from a good backup prior to the infection.
- Don’t open attachments or links you weren’t expecting. If it’s an email attachment or link you weren’t expecting, or from someone you don’t know or do business with, pick up the phone and call them to verify that it is legitimate. We have seen Cryptolocker arrive in an email that appears to be concerning Payroll data. Malware attempts can be sneaky, arriving in the form of what look like Facebook, LinkedIn, shipping or banking notifications with vaguely named attachments. NEVER open an attachment unless you know the person sending it to you and you’re expecting a file on the topic mentioned.
- If you do click on something unsafe and receive a CryptoLocker message, physically disconnect from your network connection immediately. While this won’t save your computer and local files from infection, it may keep the program from spreading and infecting the rest of the network.
- Be sure that all network servers and workstations are up to date with Operating System patches and appropriate anti-virus updates.
Again, please use extreme caution when opening email attachments or links from untrusted or unknown sources as this virus is very dangerous. Please reach out to your CNP rep with any questions or to discuss further protecting your network.