Ransomware has been widely adopted by cybercriminals and malicious governments, representing a possibly existential risk to companies that are victimized. Current versions of ransomware target everything, including backup, making even partial recovery a long and expensive process. Novel versions of ransomware like Ryuk, Maze, Sodinokibi, Netwalker, DopplePaymer, Snatch and Egregor have made the headlines, displacing Locky, Spora, and CryptoWall in prominence, elaborateness, and destructive impact.
90% of ransomware breaches are the result of innocuous-seeming emails that have dangerous links or file attachments, and many are "zero-day" attacks that elude the defenses of traditional signature-matching antivirus (AV) tools. Although user education and frontline identification are important to protect your network against ransomware attacks, leading practices demand that you assume some malware will inevitably succeed and that you prepare a solid backup mechanism that permits you to recover rapidly with little if any damage.
Progent's ProSight Ransomware Preparedness Checkup is a low-cost service centered around a remote interview with a Progent security consultant skilled in ransomware defense and repair. During this interview Progent will work with your Anaheim network managers to gather pertinent data about your cybersecurity setup and backup environment. Progent will use this data to produce a Basic Security and Best Practices Assessment detailing how to adhere to best practices for configuring and managing your security and backup solution to prevent or clean up after a ransomware attack.
Progent's Basic Security and Best Practices Report focuses on key areas associated with ransomware defense and restoration recovery. The review covers:
Cybersecurity
About Ransomware
Ransomware is a variety of malicious software that encrypts or deletes files so they cannot be used or are publicized. Ransomware sometimes locks the victim's computer. To prevent the damage, the target is required to send a specified amount of money (the ransom), usually via a crypto currency such as Bitcoin, within a short period of time. There is no guarantee that paying the ransom will restore the lost data or prevent its exposure to the public. Files can be altered or erased across a network based on the victim's write permissions, and you cannot break the strong encryption technologies used on the compromised files. A typical ransomware delivery package is spoofed email, whereby the user is lured into responding to by a social engineering exploit called spear phishing. This causes the email message to appear to come from a trusted sender. Another popular attack vector is an improperly protected RDP port.
The ransomware variant CryptoLocker ushered in the new age of ransomware in 2013, and the monetary losses caused by different versions of ransomware is said to be billions of dollars per year, roughly doubling every other year. Famous attacks are WannaCry, and NotPetya. Current headline threats like Ryuk, DoppelPaymer and Spora are more complex and have caused more havoc than older strains. Even if your backup/recovery processes enable your business to restore your ransomed files, you can still be threatened by exfiltration, where stolen documents are exposed to the public (known as "doxxing"). Because additional variants of ransomware crop up every day, there is no guarantee that traditional signature-based anti-virus filters will block a new attack. If an attack does appear in an email, it is important that your end users have been taught to be aware of social engineering techniques. Your ultimate defense is a sound scheme for scheduling and retaining offsite backups and the deployment of dependable restoration platforms.
Contact Progent About the ProSight Ransomware Readiness Testing in Anaheim
For pricing details and to learn more about how Progent's ProSight Crypto-Ransomware Vulnerability Report can bolster your defense against ransomware in Anaheim, call Progent at