{"id":1317,"date":"2018-09-21T15:00:53","date_gmt":"2018-09-21T22:00:53","guid":{"rendered":"https:\/\/www.wowrack.com\/blog\/?p=1317"},"modified":"2024-04-02T10:28:30","modified_gmt":"2024-04-02T03:28:30","slug":"3-it-strategies-to-combat-ransomware","status":"publish","type":"post","link":"https:\/\/www.wowrack.com\/en-us\/blog\/security\/3-it-strategies-to-combat-ransomware\/","title":{"rendered":"3 IT Strategies to Combat Ransomware"},"content":{"rendered":"<p>Ransomware has been a growing threat year after year.\u00a0 In fact, according to CyberSecurity Ventures, it is predicted that ransomware is expected to take a great share of the 6 TRILLION dollar cybercrime industry by 2021.\u00a0 Often times, organizations do not have adequate ways to combat this threat.\u00a0 Many IT managers think that anti-virus software is the cure-all, and unfortunately, it is very easy for predators to fool anti-viral software.<\/p>\n<p>In this article, we will address how ransomware works, and then follow up with ways to address each scenario.<\/p>\n<h2 id=\"email-links-attachments\">Email Links &amp; Attachments<\/h2>\n<p>Employee interactions with emails that appear to be legitimate have been an issue for over a decade and continue even today to trick individuals into thinking as such.\u00a0 The two main ways a hacker tries to infect a host is via links within the email and attachments.<\/p>\n<ol>\n<li><strong>Email Links<\/strong> \u2013 Typically this is the most threatening. The reason being is that a user clicks on the link and at the time the site loads, the user visiting could be immediately infected without having to fill out any other details or interact further with the website.<\/li>\n<li><strong>Email Attachments<\/strong> \u2013 Anti-virus software may be able to detect this but often times, a user is allowed to open the file, even with anti-virus software, and the payload is able to do its intended job \u2013 to hijack your information and demand ransom. For this reason, it is important for a company to be able to stop these attacks before they are able to go down the pipe to end-users (employees).<\/li>\n<\/ol>\n<h2 id=\"relaxed-password-policies-on-server-infrastructure\">Relaxed Password Policies on Server Infrastructure<\/h2>\n<p>While there are many sub-subjects related to addressing relaxed password policies, there are two primary ways a hacker can gain access themselves and deliver a payload that can potentially spread to your overall infrastructure.<\/p>\n<ol>\n<li><strong>Brute Forcing an Administrator or Root account<\/strong> \u2013 If you have weak passwords associated with your Administrator (Windows) or Root (Linux) accounts, it may be very easy to brute force and gain access this way.<\/li>\n<li><strong>Standardized Password Formatting<\/strong> \u2013 Some organizations have unique password formatting where much of the password is the same with a few predictable variables. This gives the opportunity for a former vendor or employee to gain access.<\/li>\n<\/ol>\n<h2 id=\"the-3-ways-to-combat\">The 3 Ways to Combat<\/h2>\n<p><strong>Hosted Email Security Gateway<\/strong> \u2013 One of the most crucial ways to combat ransomware attempts is to have protection in the infrastructure layer before emails are delivered to the end-user.\u00a0 One great way is a <a href=\"https:\/\/wowrack.com\/en-us\/service\/security-services\/email-hygiene-and-security\/\" rel=\"nofollow noopener\" target=\"_blank\">hosted email security service<\/a>.\u00a0 Such as service is built for the enterprise and is constantly updated with new threats. It also provides a host of other benefits that every organization should consider.<\/p>\n<p><strong>Disable Administrator\/Root Accounts<\/strong> \u2013 This is a very easy step for organizations to take and adds another layer of guess work for a potential hacker.<\/p>\n<p><strong>Establish Specific Password Policies<\/strong> \u2013 There are many software\u2019s built for the enterprise that you can utilize to help manage your passwords in addition to providing other security features for your infrastructure.\u00a0 This software can help enforce policies and provide a number of benefits including:<\/p>\n<ul>\n<li>Resetting certain device passwords every so often<\/li>\n<li>Randomized complex passwords, as per any policy you have established<\/li>\n<li>Monitoring\/recording of RDP and console sessions for certain critical devices (or all devices)<\/li>\n<li>Can establish approval workflows and real-time alerts on password access<\/li>\n<li>Helps meet security audits and regulatory compliance for such standards as HIPAA, PCI, and SOX.<\/li>\n<\/ul>\n<h2 id=\"other-important-considerations\">Other Important Considerations:<\/h2>\n<p><strong>If all else fails, have siloed backups<\/strong><\/p>\n<p>An organization can only do so much to protect themselves.\u00a0However, even with all the measures mentioned, there is still a chance of intrusion.\u00a0 When this happens, never pay the ransom!\u00a0 Instead, you should rely on your <a href=\"https:\/\/wowrack.com\/en-us\/service\/backup-disaster-recovery\/backup-as-a-service\/\" rel=\"nofollow noopener\" target=\"_blank\">managed backups<\/a> to restore from.\u00a0 In either case, you will need to reimage the infected hosts to get rid of any backdoors the hackers could have created.<\/p>\n<p><strong>Employee Training<\/strong><\/p>\n<p>Employees should be trained on how to identify threats and properly report any suspicious emails to the IT department.\u00a0 By reporting, the IT department can then feed it to the <a href=\"https:\/\/wowrack.com\/en-us\/service\/security-services\/email-hygiene-and-security\/\" rel=\"nofollow noopener\" target=\"_blank\">hosted email security platform<\/a> so that it learns and improves so that the threat stops before showing up on another employees inbox, who may not be able to identify it as an intrusion attempt.<\/p>\n<p>Wowrack\u2019s <a href=\"https:\/\/wowrack.com\/en-us\/service\/security-services\/\" rel=\"nofollow noopener\" target=\"_blank\">managed security team<\/a> can help guide your organization to see what you currently have setup and make recommendations, free of charge, to what you can do to improve.\u00a0 <strong>Contact us today for your free consultation<\/strong>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware has been a growing threat year after year.\u00a0 In fact, according to CyberSecurity Ventures, it is predicted that ransomware is expected to take a great share of the 6 TRILLION dollar cybercrime industry by 2021.\u00a0 Often times, organizations do not have adequate ways to combat this threat.\u00a0 Many IT managers think that anti-virus software [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":12670,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[82],"tags":[1131],"class_list":["post-1317","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-hosted-email-security","post-wrapper"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/posts\/1317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/comments?post=1317"}],"version-history":[{"count":0,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/posts\/1317\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/media\/12670"}],"wp:attachment":[{"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/media?parent=1317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/categories?post=1317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/tags?post=1317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}