Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

3.1 Getting your computer working again

This section is part of the amber and green pathways.

This shows three figurines dressed as builders on top of a computer.
Figure 12

If you wait until you have been attacked you may have left it too late. Before you get attacked:

  • Make a note of all software that you use and all licence keys. Store these separately from your computer.
  • Keep all your data backed up on a write-only system.
  • Check that you can install all software and data onto a new system.

You’ve realised you have been the victim of a cyber security attack, you’ve reported it, now what? How do you get your computer working again? The next sections offer some advice.