How to protect yourself from ransomware attacks

Why do I keep seeing headlines in the news about ransomware attacks

Ransomware attacks have been a persistent threat that have caused increasing headaches in recent years. Just this week Costa Rica declared a state of emergency due to a ransomware attack. Another good example was last year’s colonial pipeline hack that left people scrambling to find gas. Today ransomware attacks have evolved to be both ransom and data extorsion. Since most ransomware operators will also exfiltrate your data and threaten to post it on the web or sell it if you don’t pay up. So what can be done about this growing problem?

First, let’s get a simple definition for what a ransomware attack is. According to CISA (Cybersecurity and Infrastructure Security Agency) “Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.”

So, now that we are all on the same page as to what a ransomware attack is, how can you protect your organization from one? Layers, Layers, Layers.

To combat the numerous cybersecurity threats like ransomware attacks out there today, Greystone Technology recommends that each of our clients have the following layers of security protections. It’s important to remember that prevention is your most powerful tool

Multi-Factor Authentication: Using a method of authentication in addition to your password when logging into key systems.

Security Awareness Training: Automated testing and training of staff to bolster human awareness to identify security threats and phishing attempts.

DNS filtering: Organization-wide internet filtering preventing traffic to known malicious sites.

Advanced Endpoint Protection: Behavior-based endpoint software with 24/7 monitoring by a security team.

Dark Web Monitoring: Consistent monitoring of compromised usernames and passwords being sold in the digital black market.

The above layers of protections are by no means an exhaustive list of the security layers one can put in place for protection.

Another great layer to consider is a business continuity and disaster recovery plan. A BCDR plan is exactly what the name implies, in the event that a disaster like a ransomware attack occurs, what is your organizations plan for handling it. In the event of a ransomware attack, having your data securely backed up is key to being able to reduce the downtime and cost associated with these attacks. How and where your data is backed up is a great example of something that would be mapped out in a BCDR plan. Check out our helpful blog on how to start thinking about business continuity and disaster recovery plans here.

In addition to the protections listed above, we offer the latest cybersecurity products and services that go hand in hand with our managed IT services in order to provide you with the most effective IT period.

To learn more about how we can secure your business check out our commonsense cybersecurity page, or take some time to talk with us by contacting us! 

 

Digital community

Keeping up with technology and IT trends can be a pain if it is not one of your passions. That’s where our digital community comes in! Sign up to receive helpful news and tips about technology trends, IT, and digital transformation.

Digital community

Keeping up with technology and IT trends can be a pain if it is not one of your passions. That’s where our digital community comes in! Sign up to receive helpful news and tips about technology trends, IT, and digital transformation.

Digital community

Keeping up with technology and IT trends can be a pain if it is not one of your passions. That’s where our digital community comes in! Sign up to receive helpful news and tips about technology trends, IT, and digital transformation.