Make those minutes count

With Targeted Strategies, Ransomware Doesn’t Have to be a Constant Worry

Don’t let ransomware hurt your business. Monitor suspicious activity and set alerts.Hackers are increasingly becoming a threat to networks across industries. Ransomware attacks, which can render data absolutely useless unless the victim pays a ransom, are of particular concern. Businesses that don’t back up their data can be forced into a situation where they must pay the ransom — or they’ll never see key data again. If they can’t afford the ransom, they may have to shut their doors. It’s a critical situation that companies of all sizes need to address.

Unfortunately, ransomware attacks are rampant because they are highly lucrative for hackers. In fact, SonicWall, an IT security company, reported that there were 638 million ransomware attacks in 2016, which equates to companies shelling out millions of dollars to get their data back.

Protecting your network is of utmost importance if you’re going to stop attackers from gaining access to your system. Here are some tips for developing a strategy:

·       Train Your Employees
Let all of your employees know what ransomware is and the methods attackers use to gain access to sensitive information. These methods change over time, which means you’re going to have to schedule regular education sessions.

·       Get Antivirus Solutions and Apply Them to End Points
You need to track suspicious behavior, which is what some antivirus tools place as a priority. You’ll also need a web filter for less serious yet still troubling virus issues.

·       Test, Test, Test
Back up your data so when an attack occurs, you can jettison all the encrypted data the hackers corrupted and rely on your backups. However, you have to regularly run tests to make sure your backups are solid.

·       Patch Servers
Build a plan for patching your servers and network devices. You should also focus on your applications. This takes regular updating because hackers rely on lazy patches to snake their way in.

·       Keep a Watchful Eye on Activity
The second you see something suspicious, you might be able to react and stop something bad from happening. However, if you’re not monitoring and setting alerts, you’re putting yourself in a reactionary situation.

At T2, we’ve established network security practices that assure clients their networks are safe. We’re also committed to educating our clients on what they can do on their end to stay secure in a time when ransomware is so prevalent. Contact us today to learn more.

Staying Safe: How to Prepare for Ransomware

RansomwareThe cybercrime game can be faddish at times, with cyber crooks all briefly piling on the “flavor of the month” attack before collectively moving on to the next big thing. One thing we can be certain of after the past year, however, is that ransomware has been added to the regular menu. It’s here to stay.

How Ransomware Works

It’s no wonder the dark underbelly of the internet is so taken with ransomware attacks. For keyboard-based ne’er-do-wells it really is the gift that keeps on giving.

A ransomware attack begins much like any other cyberattack. The bad guys get into the target system by the usual methods; most frequently via a phishing email or a spear-phishing email. This opening is used to plant the malware, and it is the nature of this malware package that sets ransomware apart.

The malware, once it gains access to the system, encrypts all the data it can find with an encryption key known only to the bad guys, who then demand lots and lots of money in exchange for getting the data back.

To Pay or Not to Pay?

A business that has been hit with a successful ransomware attack usually has only 2 options: say goodbye to the data, or pay the money.

No business can afford to lose all their data, so most companies end up paying the ransom, but this has unintended consequences. Now that the bad guys have access to the system, it’s trivial for them to get back in at a later date – some even go so far as to install a backdoor into the system so they can come and go as they please. Having walked away richer the first time, what’s to stop them from going back to the well a second or even third time? They know that the company is willing to pay, and so they make the company pay.

Thankfully, while the consequences of a ransomware attack can be more dire than other types of attack, they are no more difficult to prevent, or to deal with afterwards – given a certain amount of preparation.

Ransomware Defense

The first line of defense is prevention, and this involves solid email security that can detect and remove email-based threats before they reach the recipient. Another key part of prevention, or at least mitigation, is implementing a multi-layered security solution so that breaches can’t compromise the entire system. 

Finally, under preparation and aftermath, companies need to establish and follow a business continuity plan that incorporates real-time backups of all important data.

Real-time backups can allow companies to more or less ignore ransom demands. If infected with ransomware, they can simply roll back the clock to a point before the malware hit the system and continue on, as if nothing had happened, with minimal data or productivity loss.

Conclusion

According to the FBI, ransomware attacks in 2015 were responsible for ransom payments of just over $1.5 million. In 2016 that amount was almost a thousand times more – close to $1 billion. This huge increase is because of two factors: ransomware attacks are hard to stop, and the bad guys are almost impossible to catch.

If the numbers above are any indication, it will be almost impossible for most businesses to avoid a ransomware attack in 2017. Given an environment where ransomware attacks are an inevitability, being properly prepared is the only viable option.