Ransomware has been weaponized by the major cyber-crime organizations and malicious states, posing a possibly existential threat to companies that fall victim. The latest strains of crypto-ransomware go after everything, including online backup, making even selective restoration a challenging and expensive exercise. Novel versions of ransomware like Ryuk, Maze, Sodinokibi, Netwalker, DopplePaymer, LockBit and Egregor have made the headlines, displacing WannaCry, Spora, and NotPetya in notoriety, sophistication, and destructive impact.
Most crypto-ransomware penetrations are the result of innocuous-seeming emails with malicious hyperlinks or file attachments, and a high percentage are so-called "zero-day" variants that can escape the defenses of traditional signature-matching antivirus (AV) filters. While user training and frontline detection are important to protect your network against ransomware attacks, best practices dictate that you expect that some attacks will eventually succeed and that you deploy a solid backup solution that allows you to recover quickly with minimal damage.
Progent's ProSight Ransomware Vulnerability Checkup is a low-cost service centered around an online interview with a Progent cybersecurity consultant experienced in ransomware defense and repair. During this interview Progent will collaborate with your Lima network management staff to collect critical data about your cybersecurity posture and backup environment. Progent will use this data to generate a Basic Security and Best Practices Report documenting how to adhere to leading practices for implementing and managing your cybersecurity and backup solution to prevent or recover from a crypto-ransomware attack.
Progent's Basic Security and Best Practices Report focuses on key areas associated with ransomware prevention and restoration recovery. The report covers:
Security
About Ransomware
Ransomware is a type of malware that encrypts or steals files so they are unusable or are made publicly available. Ransomware sometimes locks the victim's computer. To prevent the carnage, the target is asked to send a certain ransom, usually via a crypto currency such as Bitcoin, within a short time window. There is no guarantee that paying the ransom will restore the damaged data or prevent its publication. Files can be altered or deleted throughout a network depending on the target's write permissions, and you cannot solve the strong encryption technologies used on the hostage files. A typical ransomware attack vector is booby-trapped email, whereby the user is lured into interacting with by means of a social engineering technique called spear phishing. This makes the email message to look as though it came from a familiar sender. Another popular vulnerability is a poorly protected Remote Desktop Protocol (RDP) port.
CryptoLocker ushered in the modern era of crypto-ransomware in 2013, and the monetary losses attributed to by different strains of ransomware is said to be billions of dollars per year, more than doubling every other year. Notorious examples are WannaCry, and Petya. Current high-profile variants like Ryuk, Maze and TeslaCrypt are more elaborate and have wreaked more havoc than older strains. Even if your backup/recovery procedures enable your business to recover your ransomed data, you can still be threatened by exfiltration, where ransomed data are exposed to the public. Because new variants of ransomware are launched every day, there is no certainty that traditional signature-matching anti-virus tools will detect a new attack. If an attack does appear in an email, it is critical that your users have been taught to be aware of phishing techniques. Your last line of defense is a sound scheme for scheduling and retaining remote backups and the use of reliable recovery tools.
Ask Progent About the ProSight Crypto-Ransomware Preparedness Assessment in Lima
For pricing details and to find out more about how Progent's ProSight Crypto-Ransomware Readiness Report can bolster your protection against ransomware in Lima, call Progent at