Ransomware has become the weapon of choice for the major cyber-crime organizations and malicious governments, representing a possibly existential threat to companies that are victimized. Modern versions of ransomware target all vulnerable resources, including backup, making even selective restoration a complex and costly exercise. New strains of ransomware like Ryuk, Maze, Sodinokibi, Netwalker, Phobos, Snatch and Nephilim have emerged, displacing Locky, Spora, and Petya in prominence, sophistication, and destructiveness.
90% of crypto-ransomware breaches are the result of innocent-looking emails that include malicious hyperlinks or attachments, and many are so-called "zero-day" attacks that elude detection by legacy signature-based antivirus (AV) filters. Although user education and up-front identification are important to defend against ransomware, best practices dictate that you expect that some attacks will eventually get through and that you prepare a strong backup mechanism that allows you to restore files and services rapidly with minimal losses.
Progent's ProSight Ransomware Vulnerability Report is a low-cost service built around an online discussion with a Progent security consultant experienced in ransomware protection and repair. In the course of this interview Progent will collaborate directly with your Akron network managers to collect critical information concerning your security setup and backup processes. Progent will utilize this information to produce a Basic Security and Best Practices Assessment detailing how to adhere to best practices for implementing and administering your security and backup solution to prevent or recover from a ransomware attack.
Progent's Basic Security and Best Practices Report focuses on key issues associated with ransomware defense and restoration recovery. The review covers:
Cybersecurity
About Ransomware
Ransomware is a form of malicious software that encrypts or deletes files so they are unusable or are publicized. Ransomware sometimes locks the target's computer. To prevent the damage, the target is required to pay a specified amount of money, typically in the form of a crypto currency like Bitcoin, within a brief time window. It is never certain that delivering the extortion price will recover the lost data or avoid its publication. Files can be encrypted or erased across a network based on the target's write permissions, and you cannot reverse engineer the military-grade encryption technologies used on the compromised files. A typical ransomware delivery package is spoofed email, in which the target is tricked into responding to by means of a social engineering technique called spear phishing. This causes the email to look as though it came from a familiar source. Another popular attack vector is an improperly secured Remote Desktop Protocol port.
CryptoLocker opened the modern era of crypto-ransomware in 2013, and the damage attributed to by the many versions of ransomware is said to be billions of dollars per year, more than doubling every other year. Famous examples include Locky, and NotPetya. Current high-profile threats like Ryuk, Maze and CryptoWall are more elaborate and have wreaked more havoc than older versions. Even if your backup/recovery processes permit you to recover your encrypted data, you can still be hurt by so-called exfiltration, where stolen data are made public. Because additional variants of ransomware crop up every day, there is no certainty that conventional signature-based anti-virus filters will block a new malware. If an attack does appear in an email, it is critical that your users have learned to identify social engineering tricks. Your last line of protection is a solid scheme for scheduling and retaining offsite backups plus the use of dependable recovery platforms.
Ask Progent About the ProSight Ransomware Vulnerability Assessment in Akron
For pricing information and to learn more about how Progent's ProSight Ransomware Readiness Report can enhance your protection against crypto-ransomware in Akron, call Progent at