-
About
First-Year Application Deadline
Don't miss your chance to apply to Marist and join the Red Fox Family!
• Early Decision II and Regular Decision: Sunday, Feb. 15About
-
Academics
First-Year Application Deadline
Don't miss your chance to apply to Marist and join the Red Fox Family!
• Early Decision II and Regular Decision: Sunday, Feb. 15Academics
-
Admission & Financial Aid
First-Year Application Deadline
Don't miss your chance to apply to Marist and join the Red Fox Family!
• Early Decision II and Regular Decision: Sunday, Feb. 15Admission & Financial Aid
-
Student Life
First-Year Application Deadline
Don't miss your chance to apply to Marist and join the Red Fox Family!
• Early Decision II and Regular Decision: Sunday, Feb. 15Student Life
- Athletics
Thank you for participating in the Marist Ransomware Simulation
You have clicked on a piece of software planted by Marist Cybersecurity to test your understanding of device safety, awareness, and response. While this was a controlled test and no actual harm occurred, it’s a reminder of how easily real attacks can happen.
Please watch the following video for a further explanation on why our team conducted this simulation:
HH
The below information could have been collected by an attacker for installing that program!
IP Address:
Region:
Coordinates:
Browser:
Operating System:
Screen Resolution:
CPU:
Cookies Enabled:
Javascript Enabled: No
Luckily, this one was a simulation carried out by the Marist Cybersecurity Team.
Here is what you might have missed during this simulation:
1. Spelling Mistake in the executable & Unknown Publisher
2. Suspicious looking Setup Wizard
- The program icon is a Java Icon instead of the Cisco AnyConnect icon
- Guide is spelled “gide”
- The phrase reads “The installation will gide you through the installation” which does not make sense.
- AnyConnect is spelled “Any-Connect”
- The phrase reads “It is recommended that you have all other applications before starting setup” which does not make sense
- Possible is spelled “posible”
- Relevant is spelled “relevent”
- The phrase reads “without the rebooting need your computer” which does not make sense
- Last phrase reads “Click OK to continue” when the button says “Next”
The exit button in the top corner does not work
3. Suspicious looking Email Address
Be careful what you click! Ransomware attacks will always have indicators.
Please review the following Cybersecurity Awareness and Education resources:
- Please Review our Cyber Security and Mobile Security Best Practices documents:
- Find additional Cybersecurity policies and resources on marist.edu: Marist Information Security
- Remember to take the Cybersecurity Awareness Training annually. This can be found at: Vector LMS, Higher Education Edition Training : My Assignments (safecolleges.com)
- Regularly visit https://www.marist.edu/gonephishing to see real examples of malicious emails that have been sent to Marist University.
- Do you have any general Cybersecurity questions? Feel free to email the team at cybersecurity@marist.edu.

How to Protect Yourself from Ransomware:
- Restart Frozen Devices Before Use
- Before using a frozen computer, restart the device to ensure a clean, empty, and fresh system
- Not restarting may leave unwanted files or programs from the previous user
- Even if it looked like it was previously restarted, restart the machine yourself
- When in Doubt, Don’t Click
- If you're unsure about a file or link, ask IT or your security team before opening it
- Even after opening, it’s best practice to not click anything else and to contact the IT Department or Help Desk
- Better safe than sorry. One wrong click can lead to a real ransomware attack
- Observe Before You Click
- Files, Folders, Links, and other media must appear to be valid before clicking
- Attackers may try to disguise their malware to appear real, but there will always be indicators of something wrong even if they are not as apparent
- Look out for spelling, grammar, formatting, etc.
- Overall, Keep These Good Habits
- Restart your computer regularly – especially after suspicious activity
- Stay up to date with security training and alerts
- Report anything suspicious to the IT Department or Help Desk immediately