Ransomware has been widely adopted by cyber extortionists and bad-actor governments, posing a potentially lethal risk to companies that are victimized. Current strains of crypto-ransomware go after everything, including online backup, making even selective recovery a complex and costly exercise. New strains of crypto-ransomware such as Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), DopplePaymer, Conti and Egregor have made the headlines, replacing Locky, TeslaCrypt, and Petya in notoriety, elaborateness, and destructiveness.
90% of crypto-ransomware infections are the result of innocent-seeming emails that include malicious links or file attachments, and a high percentage are so-called "zero-day" attacks that can escape the defenses of legacy signature-based antivirus tools. While user education and up-front detection are critical to protect against ransomware, best practices dictate that you expect that some malware will inevitably get through and that you deploy a solid backup solution that allows you to recover rapidly with minimal losses.
Progent's ProSight Ransomware Vulnerability Checkup is an ultra-affordable service built around a remote interview with a Progent security consultant experienced in ransomware protection and recovery. During this assessment Progent will cooperate directly with your Charleston network management staff to gather pertinent information concerning your cybersecurity setup and backup processes. Progent will utilize this data to create a Basic Security and Best Practices Report documenting how to apply leading practices for configuring and managing your cybersecurity and backup solution to block or recover from a crypto-ransomware attack.
Progent's Basic Security and Best Practices Assessment focuses on key issues associated with crypto-ransomware defense and restoration recovery. The report addresses:
Cybersecurity
About Ransomware
Ransomware is a form of malicious software that encrypts or steals files so they are unusable or are made publicly available. Crypto-ransomware sometimes locks the target's computer. To avoid the carnage, the victim is required to send a specified amount of money (the ransom), usually in the form of a crypto currency like Bitcoin, within a brief time window. It is never certain that delivering the extortion price will recover the damaged data or prevent its publication. Files can be encrypted or deleted across a network depending on the victim's write permissions, and you cannot solve the military-grade encryption technologies used on the hostage files. A typical ransomware attack vector is spoofed email, whereby the user is tricked into responding to by a social engineering technique known as spear phishing. This makes the email to appear to come from a familiar sender. Another popular attack vector is an improperly secured RDP port.
CryptoLocker opened the modern era of ransomware in 2013, and the damage caused by different strains of ransomware is said to be billions of dollars per year, roughly doubling every other year. Notorious examples include Locky, and NotPetya. Current headline threats like Ryuk, Maze and CryptoWall are more complex and have wreaked more damage than older strains. Even if your backup procedures enable you to recover your ransomed data, you can still be threatened by exfiltration, where ransomed documents are exposed to the public. Because additional variants of ransomware are launched daily, there is no guarantee that conventional signature-based anti-virus tools will detect the latest malware. If an attack does show up in an email, it is important that your users have been taught to be aware of phishing techniques. Your ultimate protection is a sound scheme for scheduling and retaining remote backups and the deployment of reliable recovery platforms.
Contact Progent About the ProSight Ransomware Susceptibility Audit in Charleston
For pricing details and to find out more about how Progent's ProSight Ransomware Susceptibility Assessment can enhance your defense against ransomware in Charleston, call Progent at