Ransomware has been widely adopted by cyber extortionists and rogue states, representing a potentially existential risk to businesses that are breached. Current strains of crypto-ransomware target all vulnerable resources, including backup, making even selective restoration a challenging and expensive exercise. New variations of crypto-ransomware like Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), Phobos, LockBit and Nephilim have emerged, replacing WannaCry, Cerber, and CryptoWall in notoriety, sophistication, and destructive impact.
Most ransomware penetrations are caused by innocent-seeming emails with dangerous hyperlinks or attachments, and many are "zero-day" attacks that elude the defenses of traditional signature-matching antivirus filters. Although user training and up-front detection are critical to protect against ransomware, best practices dictate that you expect that some malware will inevitably get through and that you implement a strong backup solution that enables you to recover quickly with minimal losses.
Progent's ProSight Ransomware Preparedness Checkup is an ultra-affordable service built around a remote interview with a Progent cybersecurity expert experienced in ransomware protection and recovery. During this assessment Progent will collaborate with your Los Angeles IT managers to gather critical data concerning your security setup and backup environment. Progent will use this information to create a Basic Security and Best Practices Assessment documenting how to follow best practices for configuring and managing your cybersecurity and backup systems to prevent or clean up after a crypto-ransomware attack.
Progent's Basic Security and Best Practices Assessment focuses on key areas related to ransomware defense and restoration recovery. The report addresses:
Cybersecurity
About Ransomware
Ransomware is a form of malicious software that encrypts or deletes a victim's files so they cannot be used or are publicized. Ransomware sometimes locks the target's computer. To prevent the carnage, the target is asked to send a specified amount of money, usually via a crypto currency like Bitcoin, within a short time window. It is not guaranteed that paying the extortion price will recover the damaged data or avoid its exposure to the public. Files can be altered or deleted across a network based on the victim's write permissions, and you cannot solve the strong encryption technologies used on the compromised files. A typical ransomware delivery package is spoofed email, whereby the target is tricked into interacting with by a social engineering technique known as spear phishing. This causes the email to appear to come from a trusted sender. Another popular attack vector is an improperly secured RDP port.
The ransomware variant CryptoLocker opened the modern era of crypto-ransomware in 2013, and the damage caused by different versions of ransomware is said to be billions of dollars annually, roughly doubling every other year. Notorious examples are WannaCry, and NotPetya. Recent headline threats like Ryuk, Maze and TeslaCrypt are more elaborate and have caused more damage than earlier strains. Even if your backup procedures enable you to restore your ransomed data, you can still be threatened by so-called exfiltration, where ransomed data are exposed to the public (known as "doxxing"). Because additional versions of ransomware are launched every day, there is no guarantee that conventional signature-matching anti-virus filters will detect the latest malware. If an attack does show up in an email, it is critical that your end users have been taught to be aware of social engineering techniques. Your last line of defense is a sound scheme for scheduling and keeping offsite backups and the deployment of reliable restoration platforms.
Contact Progent About the ProSight Crypto-Ransomware Vulnerability Audit in Los Angeles
For pricing information and to find out more about how Progent's ProSight Crypto-Ransomware Vulnerability Evaluation can enhance your protection against ransomware in Los Angeles, call Progent at