Ransomware has been prolific over the past year. Businesses of all shapes and sizes have had their data held to ransom by cybercriminals.
There are a couple of factors CyGlass have identified to help us understand the ransomware attack vector:
CyGlass have broken it down into a 5 step process…
There has been constant debate over whether a ransomware demand should be paid. We agree with the National Cyber Security Centre (NCSC) and the National Crime Agency (NCA). Generally paying the ransom is not a good idea. Particularly when it does not actually guarantee you get your data back. For example, with ‘wiper’ malware files aren’t decrypted after the ransom is paid.
A much better strategy is defence in depth.
This means layers of defence with several mitigations at each level. Utilizing defence in the SIEM, at the endpoint, protecting critical assets with extra protection, as well as network security. By upping your ability to detect malware and stop it before it completes the full ransomware lifecycle, you are protecting the business with defence in depth. It will also make remediation much quicker and more effective.
And the most critical part of defence-in-depth when it comes to ransomware? Nothing beats backups. Having a recent offline backup of your most important files and data is critical if a ransomware attack takes hold as it means you won’t feel backed into a corner to pay the ransom.
Join our upcoming webinar on December 2nd, hosted with CyGlass where we will be exploring ransomware trends and predictions going into the New Year and discussing the findings from CyGlass' recent ransomware survey. You can save your seat here.