{"id":77502,"date":"2022-07-07T10:57:59","date_gmt":"2022-07-07T10:57:59","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=77502"},"modified":"2025-09-24T10:23:19","modified_gmt":"2025-09-24T10:23:19","slug":"interview-john-york-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/","title":{"rendered":"Interview: An Air Force Project Manager Explains How to Understand and Prevent Ransomware Attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"77502\" class=\"elementor elementor-77502\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5f88753 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f88753\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ce50b80\" data-id=\"ce50b80\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae8ecaa elementor-widget elementor-widget-video\" data-id=\"ae8ecaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=-aS2VWlTtR8&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-63b2c06 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"63b2c06\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d212723\" data-id=\"d212723\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b29efc elementor-widget elementor-widget-text-editor\" data-id=\"3b29efc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Despite being just halfway through 2022, ransomware attacks have already caused significant damage this year. Last month alone, hackers targeted web hosting providers, healthcare systems, and major library services, among several other high-profile attacks.<\/p><p>The EC-Council team caught up with John York, a Certified Ethical Hacker (CEH) from the United States who currently works as a project manager in the U.S. Air Force, to get his insights on ransomware attacks and how to prevent them.<\/p><p>https:\/\/youtube.com\/watch?v=elO8nm9668A%3Ffeature%3Doembed<\/p><p>In this interview, John explains what ransomware is, how ransomware attacks work, and what companies can do to protect themselves.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-482180f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"482180f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4ef0c87\" data-id=\"4ef0c87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d3b0aa4 elementor-widget elementor-widget-text-editor\" data-id=\"d3b0aa4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>What is a ransomware attack?<\/h2>\nRansomware is a form of malware specifically designed to remove access from an organization to its file system. Modern ransomware attacks have evolved from simply encrypting files and demanding payment for a decryption key to complex attacks that add data extraction and extortion to the attacker\u2019s playbook.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cfc2850 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cfc2850\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-463c08a\" data-id=\"463c08a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-139aa97 elementor-widget elementor-widget-text-editor\" data-id=\"139aa97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>How would you define a ransomware attack?<\/h2>\nA ransomware attack encrypts the file system so that, without a decryption code, all the information stored in the organization\u2019s file servers is inaccessible.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-86e7983 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"86e7983\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-926b803\" data-id=\"926b803\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ef1721c elementor-widget elementor-widget-text-editor\" data-id=\"ef1721c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>How does a typical ransomware attack work?<\/h2>\nIn a typical ransomware attack, the threat actor encrypts the organization\u2019s file system, holding the decryption key ransom. That\u2019s what gives it its name\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ed8d353 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ed8d353\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-761cdae\" data-id=\"761cdae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-296b736 elementor-widget elementor-widget-text-editor\" data-id=\"296b736\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>What strategies can be used to avoid ransomware attacks?<\/h2>\nThe best strategy to avoid ransomware is understanding that there is no 100% safe solution. Ransomware can affect any organization.\n\nWithout the proper backups, any organization can fall victim to ransomware. The best solution is to implement immutable backups.\n<p style=\"text-align: center;\"><em>\u201cThe best solution is to implement immutable backups.\u201d<\/em><\/p>\n<p style=\"text-align: left;\">Immutable backups are backups that cannot be altered. So, if you do fall subject to ransomware, the backups are not accessible to the ransomware and can be used to restore your live data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-89a5ad7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"89a5ad7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-754749a\" data-id=\"754749a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ef20aa6 elementor-widget elementor-widget-text-editor\" data-id=\"ef20aa6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Is your IT team equipped to deal with ransomware attacks?<\/h2><p>Learn how to counter cyberattacks with the CEH, the world\u2019s leading <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">ethical hacking certification<\/a>. Contact EC-Council to <a href=\"https:\/\/www.eccouncil.org\/get-certified-with-ec-council-with-form\/\" target=\"_blank\" rel=\"noopener\">register today<\/a>.<\/p><h2>Build a Rewarding Career with the CEH Fast-Growing Job Market<\/h2><p>1,800+ ethical hacking job openings on LinkedIn alone<sup>1<\/sup><\/p><h2>Competitive Salary<\/h2><p>CEHs in the U.S. earn over $82,000 per year on average<sup>2<\/sup><\/p><h2>Wide Range of Opportunities<\/h2><p>Prepare for 20+ cybersecurity job roles with the CEH<\/p><ol><li>https:\/\/www.linkedin.com\/jobs\/search\/?geoId=92000000&amp;keywords=ethical%20hacker&amp;location=Worldwide<\/li><li>https:\/\/www.payscale.com\/research\/US\/Job=Certified_Ethical_Hacker_(CEH)\/Salary<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6883d8e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6883d8e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-93a6aa2\" data-id=\"93a6aa2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0ea8d5a elementor-widget elementor-widget-text-editor\" data-id=\"0ea8d5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>References<\/strong><\/p><p>BlackFog. (2022). The state of ransomware in 2022. https:\/\/www.blackfog.com\/the-state-of-ransomware-in-2022\/<\/p><p>Feuer, W. (2022, May 9). Omnicell discloses some systems affected by ransomware. MarketWatch. https:\/\/www.marketwatch.com\/story\/omnicell-discloses-some-systems-affected-by-ransomware-271652100711<\/p><p>Greig, J. (2022, May 22). German library service struggling to recover from ransomware attack. The Record. https:\/\/therecord.media\/german-library-service-struggling-to-recover-from-ransomware-attack\/<\/p><p>Selsky, A. (2022, May 10). Hackers hit web hosting provider linked to Oregon elections. Oregon Public Broadcasting. https:\/\/www.opb.org\/article\/2022\/05\/10\/hackers-hit-web-hosting-provider-linked-to-oregon-elections\/<\/p><p><strong><br \/>Disclaimer<\/strong><\/p><p>Views expressed in this interview are personal. The interview has been produced with the aid of a transcription service and may contain dictation, typographical, technical, and\/or other errors. The facts, opinions, and language in the interview may not reflect the views of EC-Council or the interviewee\u2019s employer, and EC-Council does not assume any responsibility or liability for the same.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>https:\/\/www.youtube.com\/watch?v=-aS2VWlTtR8 Despite being just halfway through 2022, ransomware attacks have already caused significant damage this year. Last month alone, hackers targeted web hosting providers, healthcare systems, and major library services, among several other high-profile attacks. The EC-Council team caught up with John York, a Certified Ethical Hacker (CEH) from the United States who currently works&hellip;<\/p>\n","protected":false},"author":32,"featured_media":77504,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12083],"tags":[],"class_list":{"0":"post-77502","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethical-hacking"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Air Force Cyber Expert Explains Ransomware Attacks<\/title>\n<meta name=\"description\" content=\"Ransomware has already taken a major toll in 2022. We asked Air Force project manager and Certified Ethical Hacker John York how to prevent ransomware attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Interview: An Air Force Project Manager Explains How to Understand and Prevent Ransomware Attacks\" \/>\n<meta property=\"og:description\" content=\"Ransomware has already taken a major toll in 2022. We asked Air Force project manager and Certified Ethical Hacker John York how to prevent ransomware attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-07T10:57:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-24T10:23:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/07\/john-york.png\" \/>\n\t<meta property=\"og:image:width\" content=\"231\" \/>\n\t<meta property=\"og:image:height\" content=\"231\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Interview: An Air Force Project Manager Explains How to Understand and Prevent Ransomware Attacks\",\"datePublished\":\"2022-07-07T10:57:59+00:00\",\"dateModified\":\"2025-09-24T10:23:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/\"},\"wordCount\":560,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/john-york.png\",\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/\",\"name\":\"Air Force Cyber Expert Explains Ransomware Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/john-york.png\",\"datePublished\":\"2022-07-07T10:57:59+00:00\",\"dateModified\":\"2025-09-24T10:23:19+00:00\",\"description\":\"Ransomware has already taken a major toll in 2022. We asked Air Force project manager and Certified Ethical Hacker John York how to prevent ransomware attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/john-york.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/john-york.png\",\"width\":231,\"height\":231,\"caption\":\"John York - Certified Ethical Hacker (CEH)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/interview-john-york-ransomware-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ethical Hacking\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Interview: An Air Force Project Manager Explains How to Understand and Prevent Ransomware Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Air Force Cyber Expert Explains Ransomware Attacks","description":"Ransomware has already taken a major toll in 2022. We asked Air Force project manager and Certified Ethical Hacker John York how to prevent ransomware attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Interview: An Air Force Project Manager Explains How to Understand and Prevent Ransomware Attacks","og_description":"Ransomware has already taken a major toll in 2022. We asked Air Force project manager and Certified Ethical Hacker John York how to prevent ransomware attacks.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-07-07T10:57:59+00:00","article_modified_time":"2025-09-24T10:23:19+00:00","og_image":[{"width":231,"height":231,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/07\/john-york.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Interview: An Air Force Project Manager Explains How to Understand and Prevent Ransomware Attacks","datePublished":"2022-07-07T10:57:59+00:00","dateModified":"2025-09-24T10:23:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/"},"wordCount":560,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/07\/john-york.png","articleSection":["Ethical Hacking"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/","name":"Air Force Cyber Expert Explains Ransomware Attacks","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/07\/john-york.png","datePublished":"2022-07-07T10:57:59+00:00","dateModified":"2025-09-24T10:23:19+00:00","description":"Ransomware has already taken a major toll in 2022. We asked Air Force project manager and Certified Ethical Hacker John York how to prevent ransomware attacks.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/07\/john-york.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/07\/john-york.png","width":231,"height":231,"caption":"John York - Certified Ethical Hacker (CEH)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/interview-john-york-ransomware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Ethical Hacking","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/"},{"@type":"ListItem","position":4,"name":"Interview: An Air Force Project Manager Explains How to Understand and Prevent Ransomware Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/77502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=77502"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/77502\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/77504"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=77502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=77502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=77502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}