Ransomware has been widely adopted by the major cyber-crime organizations and rogue governments, representing a potentially lethal threat to companies that are breached. Current strains of ransomware go after all vulnerable resources, including backup, making even partial recovery a challenging and costly exercise. New versions of ransomware such as Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), Phobos, Snatch and Egregor have emerged, displacing WannaCry, TeslaCrypt, and Petya in notoriety, sophistication, and destructive impact.
Most ransomware infections come from innocuous-looking emails that include malicious links or file attachments, and many are so-called "zero-day" variants that can escape the defenses of traditional signature-matching antivirus (AV) filters. Although user training and frontline detection are important to protect against ransomware, leading practices dictate that you assume some attacks will eventually get through and that you deploy a solid backup mechanism that enables you to recover quickly with little if any damage.
Progent's ProSight Ransomware Preparedness Report is a low-cost service centered around an online discussion with a Progent cybersecurity expert experienced in ransomware defense and recovery. In the course of this interview Progent will cooperate directly with your Belo Horizonte IT management staff to gather critical data concerning your cybersecurity profile and backup environment. Progent will use this data to create a Basic Security and Best Practices Report detailing how to adhere to best practices for implementing and managing your cybersecurity and backup systems to block or clean up after a ransomware attack.
Progent's Basic Security and Best Practices Report focuses on key areas related to ransomware defense and restoration recovery. The report addresses:
Security
About Ransomware
Ransomware is a form of malware that encrypts or steals files so they cannot be used or are publicized. Crypto-ransomware sometimes locks the target's computer. To avoid the damage, the target is required to pay a specified amount of money, typically in the form of a crypto currency such as Bitcoin, within a short time window. It is never certain that paying the ransom will recover the damaged files or prevent its exposure to the public. Files can be altered or erased across a network based on the victim's write permissions, and you cannot break the military-grade encryption technologies used on the hostage files. A typical ransomware attack vector is booby-trapped email, in which the victim is lured into interacting with by means of a social engineering exploit known as spear phishing. This causes the email to appear to come from a trusted source. Another popular vulnerability is a poorly secured Remote Desktop Protocol port.
The ransomware variant CryptoLocker opened the modern era of crypto-ransomware in 2013, and the damage attributed to by different strains of ransomware is estimated at billions of dollars per year, more than doubling every other year. Famous examples are WannaCry, and Petya. Current high-profile threats like Ryuk, Maze and CryptoWall are more sophisticated and have caused more damage than earlier versions. Even if your backup/recovery processes enable you to recover your ransomed data, you can still be threatened by exfiltration, where ransomed documents are exposed to the public (known as "doxxing"). Because new versions of ransomware crop up every day, there is no guarantee that conventional signature-based anti-virus tools will detect the latest attack. If threat does show up in an email, it is critical that your users have learned to be aware of phishing techniques. Your ultimate defense is a solid process for performing and retaining offsite backups plus the use of reliable restoration platforms.
Contact Progent About the ProSight Ransomware Readiness Testing in Belo Horizonte
For pricing details and to learn more about how Progent's ProSight Ransomware Preparedness Testing can enhance your defense against crypto-ransomware in Belo Horizonte, call Progent at