Ransomware has been widely adopted by cyber extortionists and bad-actor governments, posing a possibly existential risk to companies that fall victim. Current strains of crypto-ransomware go after all vulnerable resources, including online backup, making even selective recovery a long and costly exercise. New strains of crypto-ransomware such as Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), DopplePaymer, LockBit and Egregor have emerged, replacing Locky, Cerber, and NotPetya in notoriety, sophistication, and destructive impact.
90% of ransomware penetrations come from innocuous-looking emails that include dangerous links or attachments, and a high percentage are "zero-day" attacks that can escape detection by legacy signature-matching antivirus (AV) filters. While user education and up-front detection are important to protect your network against ransomware attacks, best practices dictate that you take for granted some malware will inevitably succeed and that you put in place a solid backup solution that permits you to restore files and services rapidly with little if any damage.
Progent's ProSight Ransomware Vulnerability Assessment is a low-cost service centered around an online interview with a Progent security expert skilled in ransomware protection and repair. In the course of this interview Progent will work directly with your Brisbane network management staff to collect critical data about your security configuration and backup processes. Progent will utilize this information to generate a Basic Security and Best Practices Report detailing how to adhere to leading practices for configuring and administering your cybersecurity and backup systems to prevent or clean up after a crypto-ransomware assault.
Progent's Basic Security and Best Practices Report highlights vital issues associated with crypto-ransomware prevention and restoration recovery. The report addresses:
Security
About Ransomware
Ransomware is a variety of malware that encrypts or deletes files so they cannot be used or are made publicly available. Ransomware sometimes locks the target's computer. To avoid the damage, the target is asked to pay a specified amount of money (the ransom), usually via a crypto currency such as Bitcoin, within a short period of time. It is not guaranteed that delivering the ransom will restore the damaged files or prevent its exposure to the public. Files can be encrypted or deleted across a network depending on the victim's write permissions, and you cannot reverse engineer the strong encryption technologies used on the compromised files. A typical ransomware attack vector is spoofed email, whereby the user is tricked into interacting with by means of a social engineering technique known as spear phishing. This causes the email message to appear to come from a trusted sender. Another popular attack vector is an improperly protected Remote Desktop Protocol (RDP) port.
The ransomware variant CryptoLocker ushered in the new age of crypto-ransomware in 2013, and the damage caused by different strains of ransomware is said to be billions of dollars per year, roughly doubling every two years. Famous attacks are Locky, and NotPetya. Recent headline variants like Ryuk, Sodinokibi and Cerber are more sophisticated and have wreaked more havoc than older versions. Even if your backup/recovery processes allow you to restore your ransomed files, you can still be threatened by so-called exfiltration, where ransomed documents are made public. Because additional versions of ransomware crop up every day, there is no certainty that traditional signature-matching anti-virus tools will block the latest attack. If threat does show up in an email, it is critical that your end users have been taught to identify social engineering techniques. Your ultimate protection is a solid scheme for scheduling and retaining remote backups plus the deployment of reliable restoration tools.
Ask Progent About the ProSight Crypto-Ransomware Readiness Report in Brisbane
For pricing details and to learn more about how Progent's ProSight Ransomware Susceptibility Report can enhance your protection against ransomware in Brisbane, phone Progent at