IN-HOUSE PREVENTION

Ransomware: How to protect your company against attacks

4 minutes reading

Ransomware is one of the most potent threats to modern business, targeting large and small organisations. To conclude our series exploring the various techniques used by cybercriminals to drop ransomware on corporate networks, this blog will look at what organisations can do to ensure they can mitigate the risk.


Read more articles from the series:

PART 1: Introduction to a ransomware series

PART 2: Ransomware: The many dangers of Remote Desktop Protocol

PART 3: Ransomware: How to provide a valuable layer of protection to email

PART 4: Ransomware: The need to protect the weakest link

PART 5: Ransomware: A game of cat and mouse


Education

Educating staff on the attack vectors cybercriminals cyber criminals were onto the network is essential. There is a reason why they continue to use malicious links and infected attachments within emails: it works.

Share the knowledge and get teams to undertake regular Cybersecurity Awareness Training. Employees who recognise phishing, avoid online scams and understand the techniques cybercriminals use to add a vital layer of protection for the business.

Make it clear that staff should report suspicious messages and attachments right away. Early warnings can help an organisation tweak its spam and content filters and bolster its firewalls and other defences.

Make sure you have a plan in place in case of a threat occurrence that your employees are aware of and can execute in times of need.

 

Segmentation

To maximise its impact, ransomware is designed to spread to as many machines on your network as possible. Therefore, limiting the number of devices, an attacker can reach from a single entry point means you can specify the damage.

There are several approaches to implementing such a strategy, but the most common is network segmentation. This is particularly relevant in the cloud, where low cost and the relative ease with which new servers can be provisioned make it a fertile hunting ground for cybercriminals. Whether on-premises or in the cloud, make sure every part of the network is properly authorised and securely configured.

Patching

You need to keep ahead of the bad guys. Timely patching of applications and operating systems closes off potential avenues of attack. Plus, even if a ransomware attack does manage to penetrate your network, patching can reduce the damage caused. However, it can be more complicated than it sounds. It is always recommended to test patches before they are deployed thoroughly.

An intelligent, multi-platform patch management solution is recommended. It provides businesses with complete visibility over their systems, enables them to fix vulnerabilities before they are actively exploited and lets their teams know what to patch and how.

Backup up data

Today, there is more data to be backed up than ever before. The volume of data created, captured, copied and consumed worldwide is expected to reach 181 zettabytes by 2025. An adequately managed backup and recovery program provides a safety net for organisations and is crucial for recovery efforts should ransomware strike.

An all-in approach is needed, though. Unless the backup strategy is comprehensive, there is always a chance that the purveyors of ransomware will find that one device that was not backed up. Backing up data and system state on all endpoints, servers, mailboxes, network drives, mobile devices and virtual machines is crucial. When backing up data, organisations shouldn’t underestimate the usefulness of write-once media. Files stored on media that is not rewritable are immune from the predations of ransomware.

Comprehensive protection

To best protect yourself against the scourge of ransomware, ensuring you have a comprehensive cybersecurity strategy is vital. Implementing the latest patches, backing up your data, segmenting your network and educating users is essential. This should be underpinned by implementing a robust, award-winning security solution.

Banner referring to ESET PROTECT Advanced security solution

Keep reading