Ransomware has become the weapon of choice for cybercriminals and bad-actor governments, representing a potentially existential threat to companies that are victimized. Current versions of crypto-ransomware go after everything, including online backup, making even partial recovery a challenging and expensive exercise. New versions of ransomware like Ryuk, Maze, Sodinokibi, Netwalker, DopplePaymer, Snatch and Nephilim have emerged, displacing Locky, Spora, and Petya in prominence, sophistication, and destructive impact.
90% of ransomware penetrations come from innocent-looking emails with malicious links or file attachments, and many are "zero-day" strains that elude detection by legacy signature-matching antivirus (AV) filters. Although user training and frontline identification are important to defend your network against ransomware, best practices demand that you take for granted some attacks will eventually get through and that you deploy a strong backup mechanism that enables you to recover quickly with little if any damage.
Progent's ProSight Ransomware Preparedness Checkup is an ultra-affordable service centered around a remote interview with a Progent cybersecurity expert skilled in ransomware protection and repair. During this interview Progent will cooperate directly with your Charleston network managers to gather critical data concerning your security setup and backup environment. Progent will utilize this information to create a Basic Security and Best Practices Report detailing how to apply best practices for implementing and managing your cybersecurity and backup systems to block or recover from a ransomware assault.
Progent's Basic Security and Best Practices Assessment focuses on key areas associated with ransomware prevention and restoration recovery. The report covers:
Cybersecurity
About Ransomware
Ransomware is a type of malware that encrypts or steals a victim's files so they are unusable or are publicized. Crypto-ransomware often locks the victim's computer. To avoid the damage, the target is asked to send a certain amount of money, usually in the form of a crypto currency such as Bitcoin, within a brief time window. It is not guaranteed that delivering the ransom will recover the lost files or prevent its exposure to the public. Files can be encrypted or deleted across a network depending on the target's write permissions, and you cannot solve the strong encryption algorithms used on the hostage files. A common ransomware delivery package is booby-trapped email, in which the target is lured into responding to by a social engineering exploit known as spear phishing. This causes the email message to look as though it came from a familiar source. Another common vulnerability is a poorly protected Remote Desktop Protocol (RDP) port.
CryptoLocker opened the modern era of ransomware in 2013, and the damage caused by the many strains of ransomware is said to be billions of dollars annually, roughly doubling every two years. Famous attacks are WannaCry, and NotPetya. Current headline threats like Ryuk, Sodinokibi and TeslaCrypt are more elaborate and have caused more damage than earlier versions. Even if your backup processes allow you to recover your ransomed data, you can still be hurt by so-called exfiltration, where ransomed data are exposed to the public. Because additional versions of ransomware crop up daily, there is no guarantee that traditional signature-based anti-virus filters will detect the latest malware. If threat does appear in an email, it is important that your end users have been taught to be aware of phishing tricks. Your last line of defense is a solid process for performing and keeping offsite backups plus the deployment of reliable recovery platforms.
Contact Progent About the ProSight Ransomware Preparedness Evaluation in Charleston
For pricing details and to learn more about how Progent's ProSight Ransomware Readiness Review can enhance your defense against ransomware in Charleston, call Progent at