Ransomware has been weaponized by cyber extortionists and rogue governments, posing a potentially lethal risk to companies that are breached. The latest strains of ransomware go after all vulnerable resources, including online backup, making even partial recovery a long and costly process. New versions of crypto-ransomware like Ryuk, Maze, Sodinokibi, Netwalker, Phobos, Conti and Egregor have emerged, replacing Locky, Spora, and Petya in prominence, elaborateness, and destructive impact.
Most ransomware penetrations are the result of innocent-looking emails with dangerous links or file attachments, and a high percentage are "zero-day" attacks that elude the defenses of legacy signature-based antivirus filters. While user training and up-front identification are important to protect your network against ransomware attacks, best practices dictate that you assume some attacks will eventually succeed and that you deploy a solid backup solution that permits you to restore files and services quickly with little if any losses.
Progent's ProSight Ransomware Vulnerability Report is an ultra-affordable service centered around an online interview with a Progent security consultant experienced in ransomware defense and recovery. In the course of this assessment Progent will work with your Corpus Christi network managers to gather critical data concerning your cybersecurity profile and backup environment. Progent will use this data to create a Basic Security and Best Practices Assessment detailing how to apply best practices for configuring and managing your security and backup systems to block or recover from a ransomware assault.
Progent's Basic Security and Best Practices Assessment focuses on key issues associated with crypto-ransomware defense and restoration recovery. The review addresses:
Cybersecurity
About Ransomware
Ransomware is a form of malware that encrypts or deletes files so they are unusable or are made publicly available. Crypto-ransomware sometimes locks the target's computer. To prevent the damage, the victim is asked to send a specified amount of money (the ransom), usually in the form of a crypto currency like Bitcoin, within a brief period of time. It is never certain that delivering the extortion price will recover the lost files or avoid its publication. Files can be altered or deleted across a network depending on the target's write permissions, and you cannot break the strong encryption algorithms used on the hostage files. A typical ransomware delivery package is booby-trapped email, in which the target is lured into interacting with by means of a social engineering technique known as spear phishing. This causes the email to appear to come from a trusted source. Another common attack vector is an improperly secured RDP port.
The ransomware variant CryptoLocker ushered in the new age of crypto-ransomware in 2013, and the monetary losses caused by different versions of ransomware is said to be billions of dollars annually, roughly doubling every two years. Notorious attacks include Locky, and Petya. Recent high-profile variants like Ryuk, Maze and CryptoWall are more sophisticated and have wreaked more havoc than older versions. Even if your backup processes allow your business to recover your encrypted data, you can still be hurt by so-called exfiltration, where stolen data are exposed to the public (known as "doxxing"). Because new variants of ransomware crop up every day, there is no guarantee that conventional signature-matching anti-virus tools will detect a new malware. If an attack does show up in an email, it is important that your end users have learned to identify phishing techniques. Your ultimate protection is a sound scheme for scheduling and keeping remote backups plus the deployment of reliable recovery platforms.
Contact Progent About the ProSight Crypto-Ransomware Susceptibility Audit in Corpus Christi
For pricing information and to learn more about how Progent's ProSight Ransomware Preparedness Consultation can bolster your defense against crypto-ransomware in Corpus Christi, phone Progent at