If you don't want to fall for fraudsters online, you should go through the BSI's IT security checklists.
The Federal Office for Information Security, or BSI for short, has published various checklists for IT security. On the one hand, these lists provide help when it is already too late (What to do if you are a victim?), but can also be used preventatively (What to do so that you don't become a victim in the first place?).
At this point we would like to point out the two checklists regarding malware. The BSI has published the following advice on its own website :
[mk_ad]
Computer locked by malware with payment request
What to do if you are a victim?
- Under no circumstances should you comply with the blackmailer's demands and make shady transactions. This will only help the perpetrator and your data will remain blocked. In addition, you are supporting future blackmail.
- Disconnect the locked computer from your network.
- Do not plug other devices such as USB sticks into the infected computer to prevent the malware from spreading
- Then you should definitely contact the police and file a report.
- After your case is registered, take care of cleaning up your system. If you don't know how to clean your device, contact a trained expert - such as a local computer retailer or PC service provider.
- Check whether your computer or smartphone is infected with other malware. In the worst case, this can result in the purchase of new hardware.
- Finally, scan your home network with appropriate antivirus software and make sure that your hardware is free of viruses, Trojans and other ransomware .
[mk_ad]
What can you do to avoid becoming a victim in the first place?
- Ransomware often spreads via attachments in phishing emails . The victim in our example made the mistake of clicking on the attachment of a phishing email. You should only do this if you are absolutely sure that the file is of harmless origin, i.e. if you expect the attachment, the context is correct and the tone and spelling of the email match the sender. If in doubt, ask the sender by telephone.
- Never launch a download link directly from an email that you cannot 100% trust in its authenticity. If possible, always start a download directly from the provider website.
- Make regular – ideally automated – backups that you store on an external storage medium. This means you can at least restore your important documents, photos and data in the event of data or system loss.
- Regular updates of the operating system, important software and antivirus software are the basis for defending against threats.
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )


Article image: Shutterstock / By rawf8