Posts Tagged :

Guide

Industry Spotlight, LogRhythm: 5 key steps to protect against ransomware attacks…

800 450 Jack Wynn

As an industry leader in security intelligence and analytics, LogRhythm, continues to successfully empower organisations around the world, to effectively detect, respond to and neutralise damaging cyber threats.

As ransomware has been thrust into the spotlight in recent times, LogRhythm has recognised the increasing demand companies and individuals have posed. Until recently, most ransomware attacks were simply opportunistic; mostly affecting individual users’ and small businesses, and ransom demands commonly equating to a few hundred pounds for an individual computer. But now, attackers have set their sights on larger organisations that have the budgets to pay bigger ransom demands; in addition to attacking more important files and computer systems that are critical to an organisation’s everyday operations.

Now more than ever, it is important for companies to be fully prepared for the likely possibility of an attack, and here, LogRhythm details the five key steps all professionals should incorporate into an organisation’s cyber security strategy.

 

Step One: Patching

Firstly, organisations need to patch aggressively so vulnerabilities are eliminated and access routes are contained. Adequate protection of endpoints also needs to be introduced, with tools that can automatically detect and respond to infections before the likelihood of becoming big incidents.

Step Two: Detection

In the event that an organisation is hit with an attack, it is possible to minimise the damage if the malware is detected early by using threat intelligence sources to block, or at least alert, on the presence of anomalies associated with ransomware in network traffic. Make sure emails are analysed for malicious links and payload; employing rules that search for files executing from common ransomware folders to spot ransomware before any files are encrypted.

Step Three: Containment

Once the ransomware has played its role on one device, there are steps which organisations can take to contain it locally. Having an endpoint protection system that is able to look for the execution and kill the process is usually the best means of containment. The local host needs to be blocked and isolated from the network, preventing additional files on the network from being encrypted.

Step Four: Eradication

Once an organisation is aware of a ransomware incident, and it has been contained, it then needs to be eradicated. The best option is to simply replace machines that have been affected. Indeed, it’s difficult to know if residual files are hidden on the system and able to re-infect devices. However, for network locations such as mailboxes or file shares, sometimes it is more relevant to clean those locations; removing the malicious email message or ransomware instructions.

Step Five: Recovery

For recovery, the number one task is going to be restoring from backup. In most ransomware investigations, organisations usually want to complete the recovery phase by conducting a full investigation into what specific infection vector was used against the system.

Ransomware attacks against organisations are just starting to ramp up. The ramifications of a successful attack are far more extensive than just the cost of the ransom. Organisations can suffer the effects of lost productivity, loss of business, inconvenience to customers, and potentially, the permanent loss of data. An organisation’s success in defending against a ransomware attack is largely dependent on the level of preparation and the tools deployed to monitor systems and to detect, shut down and contain suspicious activity.

Find out more in LogRhythm’s eBook Ransomware Threat: A How-To Guide on Preparing for and Detecting an Attack Before it’s Too Late

 

You can also find out more about LogRhythm’s product and solutions offerings by visiting their website: www.logrhythm.com

WinMagic logo Microsite

WinMagic: Your guide to the new EU GDPR legislation…

800 450 Jack Wynn

The long-anticipated EU General Data Protection Regulation (GDPR) has been adopted in Brussels after years of negotiations and speculation about how it will affect businesses of all sizes.

The new legislation gives citizens more control over their personal information, and makes companies responsible for keeping their data secure – with fines of up to £20 million (or 4% of turnover) and huge consequences for a breach.

Businesses now need to realise this is not just an IT problem, but a significant organisational issue that senior management need to actively engage with.

Find out what you can do now to prepare with WinMagic’s guide