Ransomware has been widely adopted by cybercriminals and rogue governments, posing a potentially existential risk to companies that are successfully attacked. The latest strains of crypto-ransomware target everything, including backup, making even selective recovery a long and expensive process. Novel versions of crypto-ransomware like Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), Phobos, LockBit and Egregor have made the headlines, replacing WannaCry, Cerber, and NotPetya in prominence, sophistication, and destructiveness.
90% of crypto-ransomware penetrations are caused by innocent-seeming emails with dangerous hyperlinks or attachments, and many are so-called "zero-day" strains that can escape the defenses of traditional signature-based antivirus (AV) filters. While user education and frontline identification are critical to defend against ransomware attacks, best practices dictate that you assume some malware will eventually get through and that you implement a strong backup solution that permits you to restore files and services quickly with little if any damage.
Progent's ProSight Ransomware Vulnerability Assessment is an ultra-affordable service built around an online discussion with a Progent security consultant skilled in ransomware defense and recovery. In the course of this assessment Progent will collaborate with your Fort Worth network management staff to collect critical information about your security setup and backup processes. Progent will utilize this data to create a Basic Security and Best Practices Assessment documenting how to apply best practices for implementing and administering your security and backup solution to block or clean up after a crypto-ransomware attack.
Progent's Basic Security and Best Practices Report focuses on key issues related to crypto-ransomware prevention and restoration recovery. The review addresses:
Cybersecurity
About Ransomware
Ransomware is a form of malware that encrypts or deletes a victim's files so they cannot be used or are publicized. Ransomware sometimes locks the victim's computer. To avoid the damage, the victim is required to send a specified amount of money (the ransom), usually via a crypto currency such as Bitcoin, within a brief time window. It is not guaranteed that paying the ransom will recover the lost files or prevent its exposure to the public. Files can be encrypted or deleted throughout a network depending on the victim's write permissions, and you cannot solve the strong encryption technologies used on the hostage files. A typical ransomware delivery package is spoofed email, in which the target is lured into responding to by means of a social engineering exploit known as spear phishing. This causes the email to appear to come from a familiar sender. Another common attack vector is a poorly secured Remote Desktop Protocol (RDP) port.
CryptoLocker ushered in the new age of ransomware in 2013, and the damage attributed to by different strains of ransomware is said to be billions of dollars annually, roughly doubling every other year. Famous examples include WannaCry, and Petya. Recent headline threats like Ryuk, DoppelPaymer and CryptoWall are more sophisticated and have caused more damage than older strains. Even if your backup/recovery procedures allow you to restore your encrypted data, you can still be hurt by so-called exfiltration, where stolen documents are made public (known as "doxxing"). Because additional versions of ransomware are launched daily, there is no certainty that conventional signature-matching anti-virus filters will block a new malware. If threat does show up in an email, it is important that your users have learned to be aware of phishing techniques. Your ultimate protection is a sound scheme for scheduling and retaining offsite backups plus the use of dependable recovery platforms.
Ask Progent About the ProSight Crypto-Ransomware Vulnerability Assessment in Fort Worth
For pricing details and to learn more about how Progent's ProSight Crypto-Ransomware Readiness Testing can enhance your defense against crypto-ransomware in Fort Worth, call Progent at