Ransomware has become the weapon of choice for cyber extortionists and rogue states, posing a possibly existential risk to businesses that are victimized. Current strains of ransomware go after everything, including online backup, making even selective restoration a long and expensive exercise. Novel strains of ransomware such as Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), DopplePaymer, Snatch and Egregor have made the headlines, displacing WannaCry, Spora, and CryptoWall in notoriety, sophistication, and destructive impact.
90% of ransomware infections come from innocent-seeming emails that include malicious hyperlinks or file attachments, and many are "zero-day" variants that can escape the defenses of legacy signature-matching antivirus (AV) tools. While user education and frontline identification are important to protect against ransomware attacks, leading practices dictate that you take for granted some attacks will eventually succeed and that you deploy a strong backup mechanism that allows you to recover rapidly with little if any damage.
Progent's ProSight Ransomware Preparedness Report is a low-cost service built around an online interview with a Progent cybersecurity consultant experienced in ransomware defense and repair. During this interview Progent will work directly with your Detroit IT management staff to collect critical data about your cybersecurity setup and backup processes. Progent will use this data to create a Basic Security and Best Practices Assessment documenting how to follow best practices for configuring and administering your security and backup solution to block or recover from a crypto-ransomware assault.
Progent's Basic Security and Best Practices Assessment focuses on key areas associated with ransomware prevention and restoration recovery. The review addresses:
Cybersecurity
About Ransomware
Ransomware is a type of malicious software that encrypts or deletes files so they cannot be used or are publicized. Ransomware often locks the victim's computer. To prevent the damage, the victim is required to send a specified ransom, usually via a crypto currency like Bitcoin, within a brief time window. It is never certain that delivering the extortion price will restore the lost files or avoid its exposure to the public. Files can be altered or erased across a network depending on the victim's write permissions, and you cannot reverse engineer the military-grade encryption algorithms used on the compromised files. A typical ransomware delivery package is tainted email, in which the victim is lured into interacting with by means of a social engineering technique known as spear phishing. This makes the email to appear to come from a familiar sender. Another common attack vector is an improperly protected RDP port.
The ransomware variant CryptoLocker opened the modern era of ransomware in 2013, and the monetary losses attributed to by the many versions of ransomware is estimated at billions of dollars per year, roughly doubling every two years. Notorious attacks are WannaCry, and NotPetya. Recent headline variants like Ryuk, Sodinokibi and TeslaCrypt are more complex and have caused more havoc than older versions. Even if your backup procedures enable your business to restore your encrypted data, you can still be threatened by so-called exfiltration, where stolen documents are exposed to the public. Because new variants of ransomware crop up every day, there is no certainty that conventional signature-matching anti-virus filters will block the latest attack. If an attack does appear in an email, it is critical that your end users have learned to identify phishing tricks. Your last line of protection is a sound process for scheduling and keeping offsite backups plus the deployment of dependable restoration tools.
Ask Progent About the ProSight Ransomware Vulnerability Checkup in Detroit
For pricing information and to learn more about how Progent's ProSight Ransomware Preparedness Checkup can bolster your defense against crypto-ransomware in Detroit, call Progent at