Ransomware has been widely adopted by cybercriminals and bad-actor governments, representing a potentially existential risk to businesses that are breached. The latest versions of ransomware go after all vulnerable resources, including online backup, making even selective recovery a long and expensive exercise. Novel variations of ransomware such as Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), Phobos, LockBit and Egregor have made the headlines, displacing Locky, Cerber, and CryptoWall in prominence, elaborateness, and destructive impact.
90% of ransomware penetrations are caused by innocuous-seeming emails with malicious links or attachments, and many are so-called "zero-day" variants that elude detection by legacy signature-matching antivirus filters. Although user training and frontline detection are important to protect your network against ransomware attacks, best practices dictate that you assume some attacks will eventually get through and that you prepare a strong backup mechanism that allows you to restore files and services quickly with minimal damage.
Progent's ProSight Ransomware Vulnerability Report is a low-cost service built around a remote discussion with a Progent cybersecurity consultant experienced in ransomware protection and recovery. During this interview Progent will work directly with your Broomfield IT management staff to collect pertinent information concerning your cybersecurity setup and backup processes. Progent will use this information to generate a Basic Security and Best Practices Assessment documenting how to apply best practices for configuring and administering your cybersecurity and backup systems to prevent or clean up after a crypto-ransomware attack.
Progent's Basic Security and Best Practices Assessment highlights key issues associated with crypto-ransomware defense and restoration recovery. The report addresses:
Cybersecurity
About Ransomware
Ransomware is a type of malicious software that encrypts or steals a victim's files so they cannot be used or are made publicly available. Ransomware often locks the target's computer. To prevent the carnage, the victim is required to send a specified amount of money (the ransom), usually via a crypto currency such as Bitcoin, within a short time window. It is not guaranteed that paying the ransom will restore the lost files or prevent its exposure to the public. Files can be altered or erased throughout a network depending on the victim's write permissions, and you cannot reverse engineer the strong encryption algorithms used on the hostage files. A common ransomware attack vector is tainted email, in which the target is lured into responding to by a social engineering technique called spear phishing. This makes the email message to look as though it came from a familiar sender. Another common attack vector is an improperly protected Remote Desktop Protocol port.
CryptoLocker ushered in the new age of ransomware in 2013, and the damage caused by different strains of ransomware is estimated at billions of dollars per year, more than doubling every other year. Famous examples are Locky, and Petya. Current headline threats like Ryuk, DoppelPaymer and Cerber are more elaborate and have wreaked more havoc than earlier strains. Even if your backup procedures permit you to restore your ransomed files, you can still be hurt by so-called exfiltration, where stolen data are made public. Because new variants of ransomware are launched daily, there is no guarantee that conventional signature-matching anti-virus tools will block the latest malware. If an attack does appear in an email, it is important that your users have learned to identify social engineering tricks. Your ultimate defense is a sound scheme for scheduling and retaining remote backups plus the use of reliable restoration platforms.
Ask Progent About the ProSight Crypto-Ransomware Preparedness Testing in Broomfield
For pricing information and to find out more about how Progent's ProSight Ransomware Preparedness Report can enhance your protection against ransomware in Broomfield, call Progent at