Ransomware has been weaponized by cyber extortionists and bad-actor governments, posing a possibly lethal risk to companies that are successfully attacked. Current variations of ransomware go after everything, including backup, making even selective recovery a complex and expensive process. New versions of crypto-ransomware such as Ryuk, Maze, Sodinokibi, Netwalker, DopplePaymer, Snatch and Nephilim have emerged, displacing Locky, TeslaCrypt, and CryptoWall in notoriety, sophistication, and destructive impact.
90% of crypto-ransomware breaches are the result of innocent-seeming emails that include malicious links or attachments, and many are "zero-day" attacks that elude the defenses of traditional signature-matching antivirus filters. While user training and up-front identification are important to protect against ransomware attacks, best practices dictate that you expect that some attacks will eventually get through and that you deploy a strong backup solution that permits you to repair the damage rapidly with little if any damage.
Progent's ProSight Ransomware Preparedness Assessment is an ultra-affordable service centered around an online interview with a Progent cybersecurity consultant skilled in ransomware protection and recovery. During this assessment Progent will cooperate directly with your Detroit network managers to gather pertinent data about your cybersecurity profile and backup processes. Progent will utilize this data to generate a Basic Security and Best Practices Report documenting how to follow best practices for configuring and managing your security and backup solution to block or recover from a crypto-ransomware assault.
Progent's Basic Security and Best Practices Report highlights key issues related to crypto-ransomware prevention and restoration recovery. The review covers:
Security
About Ransomware
Ransomware is a variety of malicious software that encrypts or deletes a victim's files so they cannot be used or are publicized. Crypto-ransomware often locks the victim's computer. To avoid the carnage, the target is required to send a certain amount of money, usually via a crypto currency such as Bitcoin, within a brief time window. It is never certain that paying the ransom will restore the lost files or prevent its exposure to the public. Files can be altered or erased throughout a network based on the victim's write permissions, and you cannot break the military-grade encryption algorithms used on the hostage files. A common ransomware attack vector is tainted email, whereby the target is lured into responding to by a social engineering exploit known as spear phishing. This causes the email message to appear to come from a trusted source. Another common attack vector is a poorly protected Remote Desktop Protocol port.
The ransomware variant CryptoLocker opened the modern era of ransomware in 2013, and the monetary losses caused by different strains of ransomware is estimated at billions of dollars annually, roughly doubling every other year. Famous examples are Locky, and NotPetya. Recent high-profile variants like Ryuk, DoppelPaymer and TeslaCrypt are more complex and have wreaked more damage than earlier versions. Even if your backup/recovery processes allow you to recover your encrypted files, you can still be threatened by so-called exfiltration, where stolen documents are made public (known as "doxxing"). Because new variants of ransomware are launched every day, there is no certainty that conventional signature-based anti-virus tools will detect a new malware. If threat does appear in an email, it is critical that your users have been taught to be aware of social engineering tricks. Your ultimate protection is a sound scheme for performing and retaining remote backups plus the deployment of reliable recovery tools.
Ask Progent About the ProSight Ransomware Preparedness Assessment in Detroit
For pricing information and to learn more about how Progent's ProSight Crypto-Ransomware Vulnerability Review can enhance your protection against crypto-ransomware in Detroit, call Progent at