Ransomware has become the weapon of choice for cyber extortionists and rogue governments, posing a possibly existential risk to businesses that fall victim. Current strains of ransomware go after all vulnerable resources, including online backup, making even selective recovery a challenging and costly process. Novel strains of ransomware like Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), DopplePaymer, Snatch and Nephilim have emerged, displacing WannaCry, TeslaCrypt, and Petya in notoriety, sophistication, and destructiveness.
90% of ransomware infections are the result of innocuous-looking emails with dangerous hyperlinks or file attachments, and a high percentage are so-called "zero-day" strains that can escape the defenses of legacy signature-based antivirus tools. While user education and up-front identification are important to defend against ransomware, leading practices demand that you expect that some malware will eventually get through and that you implement a solid backup solution that allows you to repair the damage rapidly with minimal damage.
Progent's ProSight Ransomware Vulnerability Checkup is an ultra-affordable service centered around a remote discussion with a Progent security consultant experienced in ransomware protection and repair. During this interview Progent will collaborate with your Brighton network management staff to gather critical information about your cybersecurity profile and backup processes. Progent will utilize this information to produce a Basic Security and Best Practices Assessment detailing how to apply best practices for configuring and administering your security and backup systems to block or recover from a ransomware attack.
Progent's Basic Security and Best Practices Assessment highlights key areas associated with crypto-ransomware prevention and restoration recovery. The report covers:
Security
About Ransomware
Ransomware is a type of malicious software that encrypts or steals a victim's files so they are unusable or are made publicly available. Crypto-ransomware sometimes locks the victim's computer. To prevent the damage, the target is asked to pay a certain amount of money, typically via a crypto currency such as Bitcoin, within a short period of time. There is no guarantee that delivering the ransom will recover the lost data or avoid its exposure to the public. Files can be altered or deleted throughout a network based on the target's write permissions, and you cannot break the strong encryption technologies used on the compromised files. A typical ransomware attack vector is tainted email, whereby the user is lured into responding to by means of a social engineering exploit called spear phishing. This causes the email to look as though it came from a familiar sender. Another common attack vector is a poorly protected Remote Desktop Protocol (RDP) port.
The ransomware variant CryptoLocker opened the modern era of ransomware in 2013, and the monetary losses attributed to by different strains of ransomware is said to be billions of dollars annually, roughly doubling every other year. Famous examples are WannaCry, and Petya. Current headline variants like Ryuk, Sodinokibi and Spora are more sophisticated and have caused more damage than older versions. Even if your backup procedures allow you to recover your encrypted files, you can still be threatened by so-called exfiltration, where ransomed documents are made public (known as "doxxing"). Because new versions of ransomware are launched every day, there is no certainty that traditional signature-based anti-virus tools will block a new attack. If an attack does show up in an email, it is important that your users have learned to identify social engineering tricks. Your last line of defense is a sound scheme for performing and retaining remote backups plus the deployment of dependable recovery tools.
Ask Progent About the ProSight Crypto-Ransomware Susceptibility Checkup in Brighton
For pricing details and to learn more about how Progent's ProSight Crypto-Ransomware Susceptibility Report can enhance your defense against ransomware in Brighton, call Progent at