Ransomware has been widely adopted by the major cyber-crime organizations and rogue governments, representing a possibly existential risk to businesses that are breached. The latest strains of crypto-ransomware target all vulnerable resources, including backup, making even partial recovery a challenging and expensive exercise. Novel versions of crypto-ransomware such as Ryuk, Maze, Sodinokibi, Netwalker, Phobos, LockBit and Nephilim have made the headlines, displacing WannaCry, Cerber, and NotPetya in notoriety, sophistication, and destructive impact.
90% of crypto-ransomware penetrations are the result of innocuous-seeming emails with malicious links or attachments, and many are so-called "zero-day" variants that elude detection by traditional signature-based antivirus filters. While user education and frontline identification are important to protect against ransomware attacks, leading practices dictate that you take for granted some attacks will inevitably get through and that you implement a strong backup mechanism that enables you to restore files and services rapidly with little if any damage.
Progent's ProSight Ransomware Vulnerability Assessment is an ultra-affordable service centered around an online interview with a Progent security expert experienced in ransomware defense and recovery. During this assessment Progent will work directly with your Brisbane IT managers to gather critical data concerning your cybersecurity profile and backup processes. Progent will utilize this information to produce a Basic Security and Best Practices Assessment documenting how to adhere to leading practices for configuring and administering your security and backup systems to block or clean up after a ransomware attack.
Progent's Basic Security and Best Practices Assessment highlights vital areas associated with crypto-ransomware defense and restoration recovery. The report covers:
Cybersecurity
About Ransomware
Ransomware is a variety of malicious software that encrypts or steals files so they are unusable or are made publicly available. Ransomware often locks the victim's computer. To avoid the carnage, the victim is asked to send a certain amount of money (the ransom), usually via a crypto currency such as Bitcoin, within a brief time window. It is not guaranteed that delivering the ransom will recover the damaged data or avoid its publication. Files can be encrypted or erased across a network based on the victim's write permissions, and you cannot solve the military-grade encryption algorithms used on the hostage files. A common ransomware delivery package is booby-trapped email, in which the victim is lured into interacting with by means of a social engineering technique known as spear phishing. This makes the email message to appear to come from a trusted source. Another popular vulnerability is a poorly protected RDP port.
The ransomware variant CryptoLocker ushered in the modern era of crypto-ransomware in 2013, and the damage attributed to by the many strains of ransomware is said to be billions of dollars annually, roughly doubling every two years. Notorious examples are Locky, and NotPetya. Current headline threats like Ryuk, Sodinokibi and TeslaCrypt are more complex and have caused more havoc than earlier versions. Even if your backup/recovery processes enable you to recover your ransomed data, you can still be hurt by so-called exfiltration, where ransomed documents are exposed to the public (known as "doxxing"). Because new variants of ransomware crop up daily, there is no certainty that traditional signature-based anti-virus tools will detect the latest malware. If an attack does appear in an email, it is critical that your users have been taught to be aware of social engineering techniques. Your last line of protection is a solid process for scheduling and retaining offsite backups plus the deployment of dependable recovery platforms.
Ask Progent About the ProSight Ransomware Susceptibility Assessment in Brisbane
For pricing details and to learn more about how Progent's ProSight Crypto-Ransomware Vulnerability Checkup can enhance your defense against ransomware in Brisbane, phone Progent at