Skip to content

DONT GET HELD TO RANSOM

Ransomware is a staple earner for bad actors and the cost of ransomware incidents worldwide is expected to spiral out of control, exceeding £215 billion by 2031

Hackers will generally use ransomware to encrypt your data and lock you out of your own systems. Most organizations don’t realize they are actually technology companies until it’s too late. Often without our data, we are nothing!

The unfortunate truth is that even with the best malware protection and cyber infrastructure, many organizations fall victim to ransomware on a daily basis.

So what can you do to keep your corporate, organizational and customer data safe?

OUR TOP 5 TIPS TO MITIGATE THE IMPACT OF RANSOMWARE ATTACKS

1. BACKUP YOUR DATA

Encrypting ransomware is one of the most common and dangerous types you are likely to encounter. It will allow you to navigate and see your data but you cannot access or use it once encrypted.

Negotiating with 3rd party threat actors is never advised and will likely end in further dramatics.

Data backup is the only way to recover from ransomware and this is why we always recommend employing the 3-2-1 backup strategy.

The 3-2-1 backup strategy means having at least three copies of your data, two local (on-site) but on different media, and at least one copy off-site.

2. UPDATES

Making sure your systems are running the latest updates will reduce the chance of leaving the doors open for threat actors to take advantage of. Updates will often fix known and exploited security flaws.

We recommend having an enforced maintenance cycle on your systems to ensure updates and patches are not missed.

3. ENDPOINT PROTECTION

Stopping the threat before it takes hold via endpoint protection is one of the best and most effective ways of defending against ransomware.

There are many different vendors out there and it’s easy to drown in the options. We recommend software like Windows Defender Endpoint and Sentinel One.

Not running any endpoint protection is like going to war with no body armour.

4. FIREWALLS

Firewalls act as one of the first hurdles for any threat actor to deal with. A firewall is like a bouncer at the front door who either lets you in or kicks you out.

Well-implemented firewalls will reduce the attack surface and eliminate people sneaking in via the backdoor. You can also reduce the chances of lateral movement by having well-segmented networks.

5. USER EDUCATION

Often your biggest risk – Users. Good cyber security awareness training helps organisations prevent and mitigate user risk. However, users often do not appreciate how critical their role is in protecting and enforcing good security practices.

Teaching your employees how to identify which emails seem phishy or suspicious is essential. Our golden rule is – If you weren’t expecting it then don’t read it.

Cyber security awareness training is best conducted on a bi-annual basis at a minimum.

If you have any questions on the aspects discussed in the blog post or would like us to review your environment please get in touch!