Ransomware – Help Yourself Before Seeking Help

Post with image

Your organization’s data is invaluable, Don’t let a Ransomware attack put a price tag on it. Recovering data encrypted by a Ransomware attack is next to impossible, so prevention offers the better approach.

Ransomware is a type of malware that can be covertly installed on a computer without knowledge or intention of the user that restricts access to the infected computer system in some way and demands that the user pay a ransom to the malware operators to remove the restriction.

They encrypt the data with 256 bit AES encryption which is unbreakable Private Key. Also the key to decrypt files itself is encrypted with 2048 bit RSA encryption, which again, is unbreakable at times

In simpler words, you expose your data to the outside world & the hackers extort money to give you your data back.

 The trend has significantly heightened the need for organizations to have measures in place for blocking the threat and for mitigating damage to the extent possible. Most security experts agree that it is almost impossible to recover data that might have been encrypted in a Ransomware attack without access to the decryption keys, or to a backup copy of the affected data.

So the focus has to be on prevention.

Such attacks have been very common from a few recent incidents and it is prudent that you take precautionary measures to ensure you do your best to safeguard your precious data. So how do you do it???

1. Use reputable antivirus software and a dedicated firewall.

Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company. Ensure you scan your server often with latest definitions & action the report. Firewall Rules should ensure only authorized & required services are open from allowed ip addresses and the rest blocked.

Stop the Lazy ANY<ANY<ANY rule. Protect your open RDP & Secure Shell access immediately.

2. Patches and Updates

Maintaining a strict Operating System and Application update helps. All OEM’s release regular & critical security related updates time to time. Ensure you keep your OS & Apps updated with time.

3. Enable your popup blocker

Popups are a prime tactic used by the bad guys, so simply avoid even accidentally clicking on an infected popup. If a popup appears, click on the X in the right-hand corner. The buttons within a popup might have been reprogrammed by the criminals, so do not click on them

4. Be Aware

Don’t click on links inside emails, and avoid suspicious websites. Do not use your production server to browse the internet. If your server does come under attack, use another computer to research details about the type of attack. But be aware that the bad guys are devious enough to create fake sites, perhaps touting their own fake antivirus software or their de-encryption program.

5. Browsing from Production Server?

Stop browsing internet from your production server. This is the most common method of downloading unwanted Trojans and Viruses. Remember your Production server is your business livelihood, don’t let a new recruit have fun on internet at cost of your business

6. Tests your Weaknesses & Strengths

You may think your server and firewall & application is hardened to its best capacity but it may not be the actual case. Hackers love overconfident people. Undergo detailed VAPT from a reputed paid enterprise scanner to identify your Weaknesses & help strengthen them. Web Werks works with Industry Best Enterprises for automated & manual testing complying to OWASP & PCI standards. Ask for More

7. Backup your Data – the life savior

How many times we have thought, Oh What if I had my Data Backup! Backup should not only critical files but all backup all data. Web Werks Block Level backup allows you to backup all data seamlessly as per your requirement.

 
About Author

Akshay Dere is a Seasoned Professional with over 16 years of total IT experience and with international experience as a Solution Architect, Evangelist, Manager, Thinker, Negotiator and Technical Support engineer. He also heads Network Operations for Mumbai Convergence Hub. You can reach him on akshay(at)mumbaich.com

Likes(1)Dislikes(0)

Leave a reply

Your email adress will not be published. Required fields are marked*