Ransomware has been widely adopted by cybercriminals and bad-actor governments, posing a possibly lethal threat to companies that are breached. Current versions of ransomware go after all vulnerable resources, including backup, making even partial restoration a challenging and costly process. Novel strains of crypto-ransomware such as Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), DopplePaymer, Conti and Egregor have emerged, replacing WannaCry, Cerber, and Petya in prominence, elaborateness, and destructiveness.
90% of ransomware penetrations come from innocuous-looking emails with dangerous hyperlinks or file attachments, and many are "zero-day" strains that elude the defenses of traditional signature-based antivirus tools. While user training and up-front identification are important to protect your network against ransomware attacks, best practices demand that you assume some malware will inevitably get through and that you implement a strong backup mechanism that enables you to recover quickly with little if any damage.
Progent's ProSight Ransomware Vulnerability Checkup is an ultra-affordable service built around a remote interview with a Progent security expert experienced in ransomware protection and recovery. During this interview Progent will collaborate with your Brasília network management staff to collect pertinent information about your security posture and backup processes. Progent will use this data to produce a Basic Security and Best Practices Report documenting how to apply leading practices for implementing and administering your security and backup solution to block or recover from a crypto-ransomware attack.
Progent's Basic Security and Best Practices Report highlights key areas related to crypto-ransomware prevention and restoration recovery. The report covers:
Security
About Ransomware
Ransomware is a type of malware that encrypts or steals a victim's files so they cannot be used or are publicized. Crypto-ransomware sometimes locks the victim's computer. To avoid the damage, the victim is asked to pay a certain amount of money, usually via a crypto currency such as Bitcoin, within a short time window. It is not guaranteed that delivering the ransom will recover the lost files or avoid its exposure to the public. Files can be altered or erased across a network depending on the target's write permissions, and you cannot reverse engineer the military-grade encryption technologies used on the hostage files. A common ransomware delivery package is spoofed email, in which the target is lured into responding to by means of a social engineering exploit known as spear phishing. This makes the email to appear to come from a familiar source. Another common attack vector is a poorly secured RDP port.
The ransomware variant CryptoLocker opened the new age of ransomware in 2013, and the damage attributed to by different strains of ransomware is estimated at billions of dollars annually, roughly doubling every other year. Notorious examples are WannaCry, and Petya. Current high-profile variants like Ryuk, Maze and Spora are more sophisticated and have wreaked more damage than earlier strains. Even if your backup procedures enable your business to recover your encrypted files, you can still be hurt by exfiltration, where stolen data are exposed to the public. Because new versions of ransomware crop up every day, there is no guarantee that conventional signature-matching anti-virus filters will detect the latest malware. If threat does show up in an email, it is important that your end users have been taught to identify social engineering techniques. Your last line of protection is a sound process for performing and retaining remote backups plus the deployment of dependable restoration tools.
Contact Progent About the ProSight Crypto-Ransomware Susceptibility Audit in Brasília
For pricing details and to find out more about how Progent's ProSight Crypto-Ransomware Susceptibility Report can bolster your defense against ransomware in Brasília, call Progent at