Ransomware has been weaponized by the major cyber-crime organizations and bad-actor states, representing a possibly lethal risk to companies that are successfully attacked. Modern versions of ransomware go after all vulnerable resources, including backup, making even selective restoration a complex and costly exercise. Novel versions of crypto-ransomware like Ryuk, Maze, Sodinokibi, Netwalker, Phobos, Conti and Egregor have made the headlines, displacing Locky, TeslaCrypt, and NotPetya in notoriety, sophistication, and destructiveness.
90% of ransomware infections are the result of innocuous-seeming emails with dangerous links or file attachments, and many are so-called "zero-day" attacks that elude detection by traditional signature-matching antivirus (AV) tools. Although user education and frontline detection are important to protect your network against ransomware, leading practices demand that you assume some attacks will inevitably succeed and that you prepare a strong backup solution that allows you to recover rapidly with little if any damage.
Progent's ProSight Ransomware Vulnerability Checkup is a low-cost service centered around a remote interview with a Progent security expert experienced in ransomware protection and recovery. In the course of this assessment Progent will cooperate directly with your Manaus network management staff to collect pertinent information about your cybersecurity setup and backup environment. Progent will use this information to produce a Basic Security and Best Practices Assessment detailing how to apply leading practices for configuring and managing your security and backup solution to prevent or recover from a ransomware attack.
Progent's Basic Security and Best Practices Assessment highlights key issues associated with crypto-ransomware prevention and restoration recovery. The report addresses:
Security
About Ransomware
Ransomware is a form of malicious software that encrypts or steals files so they cannot be used or are made publicly available. Ransomware often locks the target's computer. To avoid the carnage, the target is asked to pay a specified ransom, typically in the form of a crypto currency like Bitcoin, within a short time window. There is no guarantee that paying the ransom will restore the damaged data or avoid its exposure to the public. Files can be altered or deleted throughout a network based on the victim's write permissions, and you cannot solve the strong encryption technologies used on the compromised files. A common ransomware attack vector is tainted email, in which the target is tricked into responding to by means of a social engineering exploit known as spear phishing. This makes the email to look as though it came from a familiar sender. Another popular attack vector is a poorly protected Remote Desktop Protocol port.
CryptoLocker ushered in the new age of ransomware in 2013, and the damage attributed to by the many versions of ransomware is said to be billions of dollars annually, more than doubling every two years. Notorious attacks are WannaCry, and NotPetya. Recent high-profile threats like Ryuk, DoppelPaymer and Cerber are more elaborate and have wreaked more havoc than earlier versions. Even if your backup processes enable your business to recover your encrypted files, you can still be hurt by so-called exfiltration, where stolen data are exposed to the public. Because additional versions of ransomware crop up daily, there is no certainty that conventional signature-matching anti-virus tools will detect a new attack. If threat does appear in an email, it is critical that your users have learned to be aware of social engineering techniques. Your ultimate protection is a sound scheme for performing and retaining offsite backups plus the deployment of reliable restoration tools.
Ask Progent About the ProSight Ransomware Susceptibility Report in Manaus
For pricing information and to learn more about how Progent's ProSight Ransomware Susceptibility Review can enhance your protection against ransomware in Manaus, call Progent at