Ransomware has been weaponized by the major cyber-crime organizations and malicious governments, representing a possibly lethal threat to companies that are successfully attacked. Modern strains of ransomware target all vulnerable resources, including online backup, making even partial recovery a challenging and costly process. New versions of crypto-ransomware such as Ryuk, Maze, Sodinokibi, Netwalker, DopplePaymer, LockBit and Nephilim have made the headlines, displacing WannaCry, TeslaCrypt, and NotPetya in prominence, elaborateness, and destructive impact.
Most ransomware penetrations are the result of innocuous-seeming emails with dangerous links or attachments, and a high percentage are "zero-day" attacks that elude the defenses of traditional signature-based antivirus (AV) tools. Although user education and frontline detection are critical to protect against ransomware, best practices dictate that you expect that some attacks will eventually get through and that you deploy a strong backup mechanism that allows you to recover quickly with minimal damage.
Progent's ProSight Ransomware Preparedness Checkup is an ultra-affordable service built around an online discussion with a Progent security consultant experienced in ransomware protection and recovery. During this assessment Progent will collaborate directly with your Colorado Springs network managers to collect critical information about your cybersecurity setup and backup environment. Progent will use this information to create a Basic Security and Best Practices Report detailing how to adhere to best practices for implementing and managing your security and backup solution to block or clean up after a crypto-ransomware assault.
Progent's Basic Security and Best Practices Assessment highlights key areas associated with ransomware prevention and restoration recovery. The report addresses:
Security
About Ransomware
Ransomware is a type of malware that encrypts or steals a victim's files so they cannot be used or are publicized. Crypto-ransomware often locks the victim's computer. To avoid the damage, the victim is required to send a certain amount of money, typically via a crypto currency like Bitcoin, within a short time window. It is never certain that delivering the extortion price will restore the damaged data or prevent its publication. Files can be altered or erased across a network depending on the target's write permissions, and you cannot solve the strong encryption algorithms used on the compromised files. A common ransomware delivery package is booby-trapped email, whereby the user is tricked into interacting with by means of a social engineering exploit known as spear phishing. This makes the email to appear to come from a trusted source. Another common attack vector is an improperly protected RDP port.
The ransomware variant CryptoLocker ushered in the modern era of crypto-ransomware in 2013, and the monetary losses attributed to by different versions of ransomware is said to be billions of dollars per year, more than doubling every other year. Notorious examples include WannaCry, and Petya. Current high-profile threats like Ryuk, DoppelPaymer and TeslaCrypt are more complex and have wreaked more damage than older versions. Even if your backup/recovery processes permit you to recover your encrypted files, you can still be threatened by exfiltration, where ransomed documents are made public (known as "doxxing"). Because new variants of ransomware are launched daily, there is no certainty that conventional signature-based anti-virus tools will detect a new malware. If an attack does appear in an email, it is important that your end users have learned to be aware of social engineering techniques. Your last line of defense is a sound scheme for scheduling and keeping remote backups and the use of reliable recovery tools.
Contact Progent About the ProSight Ransomware Readiness Consultation in Colorado Springs
For pricing information and to learn more about how Progent's ProSight Crypto-Ransomware Vulnerability Checkup can bolster your protection against crypto-ransomware in Colorado Springs, call Progent at