Ransomware has become the weapon of choice for cyber extortionists and bad-actor states, representing a potentially existential risk to businesses that fall victim. Current versions of ransomware target everything, including backup, making even partial recovery a complex and costly process. New variations of crypto-ransomware like Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), DopplePaymer, Snatch and Egregor have made the headlines, displacing WannaCry, Spora, and Petya in notoriety, sophistication, and destructive impact.
90% of crypto-ransomware penetrations are caused by innocent-looking emails with dangerous links or attachments, and a high percentage are so-called "zero-day" attacks that elude the defenses of traditional signature-based antivirus (AV) filters. Although user education and frontline identification are important to defend against ransomware attacks, leading practices dictate that you assume some attacks will inevitably succeed and that you put in place a strong backup solution that allows you to restore files and services quickly with little if any damage.
Progent's ProSight Ransomware Vulnerability Checkup is a low-cost service built around an online interview with a Progent security consultant experienced in ransomware protection and repair. In the course of this assessment Progent will work with your Brighton IT managers to collect pertinent data concerning your security posture and backup environment. Progent will use this data to generate a Basic Security and Best Practices Assessment detailing how to apply best practices for configuring and managing your security and backup systems to prevent or clean up after a ransomware attack.
Progent's Basic Security and Best Practices Report highlights vital issues related to ransomware defense and restoration recovery. The review covers:
Cybersecurity
About Ransomware
Ransomware is a type of malicious software that encrypts or steals a victim's files so they are unusable or are publicized. Ransomware often locks the target's computer. To prevent the damage, the victim is required to send a specified amount of money, usually in the form of a crypto currency like Bitcoin, within a brief period of time. It is never certain that delivering the extortion price will recover the damaged files or avoid its exposure to the public. Files can be altered or erased across a network depending on the target's write permissions, and you cannot break the military-grade encryption technologies used on the hostage files. A typical ransomware delivery package is spoofed email, whereby the target is tricked into interacting with by a social engineering technique called spear phishing. This makes the email to appear to come from a familiar source. Another common attack vector is an improperly secured Remote Desktop Protocol (RDP) port.
The ransomware variant CryptoLocker opened the modern era of crypto-ransomware in 2013, and the damage attributed to by the many versions of ransomware is said to be billions of dollars per year, more than doubling every other year. Famous attacks include WannaCry, and NotPetya. Recent high-profile threats like Ryuk, Sodinokibi and Cerber are more elaborate and have wreaked more damage than earlier versions. Even if your backup procedures permit you to recover your ransomed data, you can still be threatened by exfiltration, where ransomed data are exposed to the public. Because additional versions of ransomware are launched daily, there is no guarantee that conventional signature-matching anti-virus tools will block a new malware. If an attack does show up in an email, it is important that your users have been taught to be aware of social engineering tricks. Your last line of protection is a sound process for scheduling and keeping offsite backups plus the deployment of reliable restoration platforms.
Contact Progent About the ProSight Crypto-Ransomware Readiness Testing in Brighton
For pricing details and to learn more about how Progent's ProSight Ransomware Preparedness Audit can enhance your defense against ransomware in Brighton, call Progent at