Ransomware has become the weapon of choice for cybercriminals and malicious governments, representing a potentially lethal risk to businesses that are victimized. Current variations of crypto-ransomware target all vulnerable resources, including online backup, making even selective recovery a long and costly process. New strains of ransomware such as Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), DopplePaymer, Snatch and Nephilim have made the headlines, displacing Locky, TeslaCrypt, and Petya in notoriety, elaborateness, and destructive impact.
90% of crypto-ransomware breaches are the result of innocuous-looking emails with malicious hyperlinks or attachments, and a high percentage are "zero-day" strains that elude detection by legacy signature-based antivirus filters. While user training and up-front detection are critical to protect against ransomware, best practices demand that you assume some malware will inevitably get through and that you deploy a strong backup mechanism that enables you to recover quickly with minimal losses.
Progent's ProSight Ransomware Vulnerability Assessment is a low-cost service centered around an online interview with a Progent security consultant experienced in ransomware protection and repair. During this assessment Progent will work directly with your Albuquerque IT managers to collect critical information concerning your cybersecurity posture and backup environment. Progent will utilize this information to create a Basic Security and Best Practices Report detailing how to follow best practices for implementing and managing your security and backup systems to prevent or recover from a crypto-ransomware attack.
Progent's Basic Security and Best Practices Assessment highlights vital issues related to ransomware defense and restoration recovery. The review addresses:
Security
About Ransomware
Ransomware is a type of malware that encrypts or steals files so they cannot be used or are made publicly available. Ransomware often locks the target's computer. To avoid the carnage, the victim is asked to send a specified amount of money, usually via a crypto currency like Bitcoin, within a short period of time. It is never certain that paying the ransom will restore the lost files or prevent its publication. Files can be encrypted or deleted throughout a network depending on the victim's write permissions, and you cannot reverse engineer the strong encryption algorithms used on the hostage files. A typical ransomware delivery package is tainted email, in which the user is tricked into responding to by a social engineering exploit known as spear phishing. This makes the email message to look as though it came from a trusted source. Another popular vulnerability is a poorly protected Remote Desktop Protocol port.
The ransomware variant CryptoLocker opened the new age of ransomware in 2013, and the monetary losses attributed to by the many strains of ransomware is said to be billions of dollars annually, more than doubling every two years. Notorious attacks are WannaCry, and Petya. Current headline variants like Ryuk, Maze and TeslaCrypt are more complex and have caused more damage than older versions. Even if your backup processes allow you to restore your ransomed files, you can still be threatened by exfiltration, where stolen data are made public (known as "doxxing"). Because additional versions of ransomware are launched every day, there is no guarantee that conventional signature-based anti-virus tools will detect the latest attack. If an attack does appear in an email, it is important that your end users have learned to be aware of social engineering techniques. Your last line of protection is a solid scheme for scheduling and retaining remote backups plus the use of dependable recovery tools.
Contact Progent About the ProSight Crypto-Ransomware Vulnerability Evaluation in Albuquerque
For pricing information and to learn more about how Progent's ProSight Ransomware Susceptibility Audit can bolster your protection against ransomware in Albuquerque, phone Progent at