Ransomware has become the weapon of choice for cybercriminals and malicious governments, posing a possibly existential risk to businesses that fall victim. Modern variations of crypto-ransomware target all vulnerable resources, including backup, making even selective restoration a challenging and expensive exercise. Novel strains of ransomware such as Ryuk, Maze, Sodinokibi, Netwalker, Phobos, Snatch and Nephilim have emerged, displacing Locky, Spora, and NotPetya in notoriety, elaborateness, and destructiveness.
90% of crypto-ransomware penetrations are the result of innocuous-looking emails that include malicious hyperlinks or attachments, and many are so-called "zero-day" variants that elude the defenses of traditional signature-based antivirus tools. Although user education and frontline detection are important to defend against ransomware, leading practices demand that you take for granted some malware will inevitably get through and that you put in place a solid backup solution that allows you to repair the damage rapidly with minimal losses.
Progent's ProSight Ransomware Preparedness Report is a low-cost service centered around a remote discussion with a Progent security expert skilled in ransomware defense and repair. During this interview Progent will collaborate directly with your Yonkers IT management staff to gather pertinent data concerning your security posture and backup environment. Progent will use this data to create a Basic Security and Best Practices Assessment documenting how to apply best practices for configuring and managing your cybersecurity and backup systems to block or recover from a ransomware assault.
Progent's Basic Security and Best Practices Report focuses on key issues related to ransomware prevention and restoration recovery. The report addresses:
Security
About Ransomware
Ransomware is a form of malware that encrypts or steals files so they cannot be used or are publicized. Crypto-ransomware often locks the target's computer. To avoid the carnage, the target is required to send a certain ransom, typically in the form of a crypto currency like Bitcoin, within a short period of time. It is not guaranteed that delivering the extortion price will recover the lost data or prevent its exposure to the public. Files can be altered or erased across a network based on the victim's write permissions, and you cannot solve the strong encryption algorithms used on the compromised files. A typical ransomware delivery package is booby-trapped email, whereby the victim is tricked into interacting with by means of a social engineering exploit called spear phishing. This makes the email message to appear to come from a trusted source. Another common vulnerability is an improperly secured RDP port.
The ransomware variant CryptoLocker ushered in the modern era of ransomware in 2013, and the monetary losses caused by the many versions of ransomware is estimated at billions of dollars annually, more than doubling every two years. Famous examples are Locky, and Petya. Current headline variants like Ryuk, DoppelPaymer and TeslaCrypt are more complex and have caused more havoc than older strains. Even if your backup/recovery procedures permit you to recover your encrypted data, you can still be threatened by exfiltration, where ransomed documents are made public. Because additional versions of ransomware are launched daily, there is no certainty that traditional signature-matching anti-virus filters will detect a new attack. If an attack does show up in an email, it is important that your users have been taught to identify phishing techniques. Your last line of defense is a solid process for scheduling and retaining offsite backups and the deployment of reliable restoration platforms.
Contact Progent About the ProSight Crypto-Ransomware Vulnerability Testing in Yonkers
For pricing details and to learn more about how Progent's ProSight Ransomware Readiness Testing can enhance your defense against crypto-ransomware in Yonkers, call Progent at