Cybersecurity Awareness Month – What to Know About Ransomware

October 07, 2019

Table of Contents:

Image illustrates Ransomware attack


Ransomware attacks

As part of our “October is Cybersecurity Awareness Month” blog posts, this time we will talk about Ransomware attacks and how you can protect yourself and your company from being a victim. There is no shortage of news on this topic. The following links are only a small number of examples of advisories and news of victims we have seen just in October.

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humor, or randomized words that don't look even slightly believable. If you are going to use a passage of Lorem Ipsum, you need to be sure there isn't anything embarrassing hidden in the middle of the text. All the Lorem Ipsum generators on the Internet tend to repeat predefined chunks as necessary, making this the first true generator on the Internet.

We can keep going but you got the idea: the threat is real. Companies are experiencing real financial impact in the form of ransom payments, fraudulent invoice payments, or wire transfers. On top of the productivity loss, reputation damage, and business interruption.

Cyber attacks are becoming more sophisticated, targeted, and persistent. Although it is important, cyber awareness training is not sufficient to counter this threat. Users need to click on links or open attachments to do their jobs. Some of these attacks are using compromised business partners and cloud services (such as Google Docs or OneDrive) making it even more challenging to distinguish a legitimate email from a malicious one. We cannot put all the responsibility on end-users.

The good news is, we have other tools in our cybersecurity toolkit. Some of the well-known best practices to protect our users against these sophisticated attacks include:

  • Perform regular backups
  • Patch operating systems and applications regularly
  • Implement a strong password policy and Multi-Factor Authentication (MFA)
  • Implement security configuration best practices for public cloud platforms and any system that is exposed to the public Internet.
  • Implement a strong Anti-Virus, Anti-Malware, and End-Point Security Solution

We hope you enjoyed our post about ransomware attacks. Check out our Vulnerability Management services to stay secure!