Ransomware has become the weapon of choice for cybercriminals and bad-actor states, posing a possibly existential threat to businesses that are victimized. The latest strains of ransomware target everything, including backup, making even selective recovery a complex and expensive process. Novel strains of crypto-ransomware such as Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), DopplePaymer, Snatch and Nephilim have made the headlines, replacing WannaCry, Spora, and Petya in notoriety, elaborateness, and destructive impact.
Most crypto-ransomware infections are caused by innocuous-looking emails that have malicious links or attachments, and a high percentage are so-called "zero-day" attacks that elude the defenses of legacy signature-based antivirus (AV) tools. Although user training and frontline identification are important to protect against ransomware attacks, best practices dictate that you take for granted some malware will eventually succeed and that you deploy a solid backup solution that enables you to repair the damage quickly with minimal losses.
Progent's ProSight Ransomware Vulnerability Assessment is an ultra-affordable service built around an online interview with a Progent security expert experienced in ransomware protection and repair. During this assessment Progent will work with your Brasília network managers to collect pertinent data about your security profile and backup processes. Progent will use this information to create a Basic Security and Best Practices Report detailing how to apply leading practices for implementing and administering your cybersecurity and backup systems to prevent or recover from a crypto-ransomware attack.
Progent's Basic Security and Best Practices Report highlights key areas related to ransomware defense and restoration recovery. The review addresses:
Security
About Ransomware
Ransomware is a type of malicious software that encrypts or deletes a victim's files so they are unusable or are made publicly available. Ransomware often locks the victim's computer. To avoid the carnage, the target is asked to pay a specified amount of money, usually in the form of a crypto currency such as Bitcoin, within a brief period of time. It is never certain that paying the extortion price will recover the damaged data or avoid its publication. Files can be encrypted or deleted throughout a network based on the target's write permissions, and you cannot reverse engineer the strong encryption technologies used on the compromised files. A common ransomware attack vector is booby-trapped email, in which the user is lured into interacting with by a social engineering technique known as spear phishing. This causes the email message to look as though it came from a trusted sender. Another common attack vector is a poorly secured RDP port.
The ransomware variant CryptoLocker ushered in the new age of crypto-ransomware in 2013, and the monetary losses attributed to by different versions of ransomware is said to be billions of dollars per year, roughly doubling every other year. Notorious attacks include WannaCry, and Petya. Recent high-profile threats like Ryuk, DoppelPaymer and TeslaCrypt are more sophisticated and have wreaked more damage than older strains. Even if your backup/recovery procedures permit your business to recover your ransomed files, you can still be threatened by exfiltration, where stolen documents are made public. Because additional variants of ransomware crop up every day, there is no guarantee that traditional signature-matching anti-virus tools will detect a new malware. If an attack does show up in an email, it is critical that your end users have been taught to identify social engineering techniques. Your last line of protection is a solid scheme for performing and keeping offsite backups and the use of reliable recovery tools.
Ask Progent About the ProSight Crypto-Ransomware Readiness Audit in Brasília
For pricing details and to find out more about how Progent's ProSight Crypto-Ransomware Readiness Audit can enhance your defense against ransomware in Brasília, call Progent at