Cyber Defense Magazine – July 2019

(Sean Pound) #1

Hackers are becoming extremely resourceful and have found ways to circumvent even the most
advanced antivirus and anti-ransomware solutions. These solutions cannot protect against Fully
UnDetectable (FUD) and targeted threats that were conceived by cyber criminals to directly evade
existing security layers and harm data.


Easy-to-use “ransomware as a service” can be purchased cheaply on the darknet. Some vendors
even offer customer support for buyers of their malware. And would-be terrorists who want customized
ransomware can hire black-hat coders for its development.


While defending against ransomware may seem daunting, business leaders and system owners, whether
they be physical or cyber-based, must prepare for and take defensive actions to prevent one-off as well
as large scale attacks. While there is no silver bullet ransomware solution, the following are some of the
most important actions your organization should take:


Educate your employees. Humans are the first line of defense against ransomware applications that
prey upon computer users to gain access to the target files and data. Train your employees to avoid
clicking on any emails from unknown or untrusted senders, especially those with attachments. Make sure
they understand that links to websites can also lead to the installation of ransomware if clicked.


Install and keep antivirus software up to date. While antivirus software is by its nature reactive to new
threats and cannot protect against FUD, which typically have a 24-48 hour window of opportunity to infect
protected systems, antivirus does provide an important line of defense when used it in conjunction with
other preventive measures.


Install and keep current a robust back-up and recovery system. Your back-up and recovery strategy
should include frequent back-ups, as well as remote or at least separate on-site storage, and systematic
duplication and recovery capabilities. This has always been a good security practice, even before the
onslaught of ransomware, as other systemic failures can compromise the availability of data and files.


Take a layered security approach. As an added key layer of data protection, consider implementing
data security or Mirror Shielding solutions. New technologies, which are available at a relatively low price
point, are helping businesses effectively deal with new strains of malware that are designed to circumvent
traditional security solutions. The most promising solutions allow businesses to instantly recover data
and files when other security defenses fail.


Invest in good cyber security advisors. Professionals are trained to see things your own IT team may
not. They will take a holistic look at not only your systems, but how they support your overall business
goals and identify any potential security gaps.


Conclusion


With an unprecedented number of ransomware and targeted attacks being reported and insights into the
large-scale damage that could result from more coordinated global attacks, it seems every business has
an obligation to put adequate measures in place to make themselves a less likely target. Attackers will
always exploit weaker and more vulnerable targets. While no one can stop terrorists from using

Free download pdf