Ransomware has been widely adopted by cybercriminals and rogue states, representing a possibly lethal risk to businesses that fall victim. The latest strains of crypto-ransomware target everything, including online backup, making even partial recovery a long and expensive process. New versions of ransomware like Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), DopplePaymer, Conti and Nephilim have made the headlines, displacing WannaCry, Spora, and CryptoWall in notoriety, sophistication, and destructive impact.
90% of ransomware breaches are caused by innocent-seeming emails with malicious links or attachments, and a high percentage are so-called "zero-day" variants that can escape detection by legacy signature-based antivirus (AV) filters. Although user education and up-front detection are important to defend your network against ransomware, best practices demand that you expect that some attacks will eventually succeed and that you prepare a strong backup solution that enables you to repair the damage rapidly with little if any losses.
Progent's ProSight Ransomware Preparedness Report is an ultra-affordable service centered around a remote interview with a Progent cybersecurity consultant experienced in ransomware protection and repair. In the course of this assessment Progent will collaborate with your Monterrey IT management staff to collect pertinent information concerning your security posture and backup processes. Progent will use this information to produce a Basic Security and Best Practices Assessment detailing how to follow leading practices for configuring and managing your cybersecurity and backup solution to block or clean up after a crypto-ransomware attack.
Progent's Basic Security and Best Practices Assessment focuses on key issues associated with crypto-ransomware defense and restoration recovery. The report covers:
Cybersecurity
About Ransomware
Ransomware is a type of malware that encrypts or deletes files so they are unusable or are made publicly available. Ransomware often locks the target's computer. To prevent the damage, the victim is required to send a certain amount of money, typically via a crypto currency such as Bitcoin, within a short time window. There is no guarantee that paying the extortion price will recover the damaged data or avoid its exposure to the public. Files can be encrypted or deleted across a network based on the target's write permissions, and you cannot solve the military-grade encryption technologies used on the hostage files. A common ransomware delivery package is spoofed email, in which the user is tricked into interacting with by a social engineering technique called spear phishing. This makes the email message to appear to come from a trusted sender. Another popular attack vector is a poorly protected RDP port.
CryptoLocker opened the modern era of ransomware in 2013, and the damage attributed to by the many strains of ransomware is said to be billions of dollars per year, roughly doubling every two years. Notorious examples are Locky, and NotPetya. Recent headline variants like Ryuk, Sodinokibi and CryptoWall are more complex and have caused more damage than older versions. Even if your backup processes allow you to recover your encrypted data, you can still be threatened by exfiltration, where stolen data are exposed to the public (known as "doxxing"). Because additional versions of ransomware crop up every day, there is no certainty that conventional signature-based anti-virus filters will detect the latest attack. If threat does show up in an email, it is critical that your end users have learned to identify phishing techniques. Your ultimate defense is a sound process for performing and keeping remote backups and the deployment of dependable restoration platforms.
Contact Progent About the ProSight Crypto-Ransomware Readiness Checkup in Monterrey
For pricing details and to learn more about how Progent's ProSight Crypto-Ransomware Susceptibility Checkup can enhance your defense against crypto-ransomware in Monterrey, phone Progent at