Ransomware has been widely adopted by cybercriminals and malicious states, representing a potentially lethal risk to companies that are successfully attacked. Current strains of ransomware target everything, including backup, making even selective recovery a long and costly process. Novel versions of crypto-ransomware such as Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), DopplePaymer, Snatch and Egregor have emerged, replacing Locky, Cerber, and NotPetya in notoriety, sophistication, and destructive impact.
90% of ransomware breaches come from innocent-seeming emails that include malicious hyperlinks or attachments, and many are so-called "zero-day" variants that can escape the defenses of traditional signature-matching antivirus tools. Although user training and frontline identification are critical to protect against ransomware attacks, leading practices demand that you assume some attacks will inevitably succeed and that you put in place a strong backup mechanism that permits you to repair the damage rapidly with little if any damage.
Progent's ProSight Ransomware Vulnerability Assessment is an ultra-affordable service built around an online discussion with a Progent security consultant skilled in ransomware protection and recovery. During this interview Progent will collaborate directly with your Broomfield network managers to gather critical information about your security setup and backup environment. Progent will utilize this data to create a Basic Security and Best Practices Report documenting how to follow leading practices for implementing and administering your cybersecurity and backup solution to prevent or recover from a crypto-ransomware assault.
Progent's Basic Security and Best Practices Report highlights key areas associated with crypto-ransomware defense and restoration recovery. The report covers:
Security
About Ransomware
Ransomware is a variety of malware that encrypts or steals files so they cannot be used or are publicized. Crypto-ransomware sometimes locks the victim's computer. To prevent the damage, the victim is required to pay a specified amount of money (the ransom), typically in the form of a crypto currency such as Bitcoin, within a brief period of time. There is no guarantee that delivering the extortion price will restore the lost data or avoid its exposure to the public. Files can be altered or erased across a network based on the target's write permissions, and you cannot reverse engineer the military-grade encryption algorithms used on the hostage files. A typical ransomware attack vector is booby-trapped email, in which the victim is lured into responding to by means of a social engineering exploit called spear phishing. This makes the email message to appear to come from a familiar source. Another popular attack vector is a poorly secured Remote Desktop Protocol port.
The ransomware variant CryptoLocker opened the modern era of crypto-ransomware in 2013, and the damage attributed to by the many versions of ransomware is said to be billions of dollars annually, roughly doubling every other year. Famous attacks include Locky, and Petya. Recent headline threats like Ryuk, Sodinokibi and CryptoWall are more complex and have wreaked more havoc than earlier versions. Even if your backup procedures permit your business to recover your ransomed files, you can still be hurt by exfiltration, where ransomed documents are made public (known as "doxxing"). Because new variants of ransomware crop up every day, there is no guarantee that traditional signature-based anti-virus tools will detect a new attack. If an attack does appear in an email, it is important that your end users have learned to identify social engineering techniques. Your last line of defense is a sound process for performing and keeping offsite backups and the use of reliable recovery platforms.
Contact Progent About the ProSight Crypto-Ransomware Susceptibility Consultation in Broomfield
For pricing information and to find out more about how Progent's ProSight Ransomware Vulnerability Report can enhance your defense against ransomware in Broomfield, call Progent at