Are You Vulnerable to a Ransomware Cyber Attack?

Ransomware cyber attacks could leave you and your business without access to crucial IT services. Heres how to deal with and prevent them.

Ransomware is a type of malware that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. It came to public attention in the UK with the 2017 WannaCry attack that crippled the IT systems of several large organisations, most notably the NHS.

Preventing attacks before they happen is the best way to protect yourself. You can do this by:

Defending your email against ransomware—email phishing and spam are the main way that ransomware is distributed. Secure Email Gateways with targeted attack protection are crucial for detecting and blocking malicious emails that deliver ransomware. These solutions protect against malicious attachments, malicious documents, and URLs in emails delivered to user computers.

Defending your mobile devices against ransomware—mobile attack protection products, when used in conjunction with mobile device management (MDM) tools, can analyze applications on users’ devices and immediately alert users and IT to any applications that might compromise the environment.

Defending your web browsing against ransomware—secure web gateways can scan users’ web traffic to identify malicious adverts that might lead to ransomware.

Monitor your server, network and back up key systems—monitoring tools can detect unusual file access activity, viruses, network C&C traffic and CPU loads, possibly in time to block ransomware from activating. Creating a full image copy of crucial systems can reduce the risk of a crashed or encrypted machine causing a crucial operational bottleneck.

If you do fall victim to an attack you should:

1 — Isolate the Infection: The rate and speed of ransomware detection is critical in combating fast moving attacks before they succeed in spreading across networks and encrypting vital data.

2 — Identify the Infection: Most often the ransomware will identify itself when it asks for ransom. There are numerous sites that help you identify the ransomware, including ID Ransomware. The No More Ransomware! Project provides the Crypto Sheriff to help identify ransomware.

3 — Report to the Authorities: You’ll be doing everyone a favor by reporting all ransomware attacks to the authorities. Victim reporting provides law enforcement with a greater understanding of the threat, provides justification for ransomware investigations, and contributes relevant information to ongoing ransomware cases.

4 — Determine Your Options:

Your options when infected with ransomware are:

Pay the ransom – this is not advised because it can make you a target in the future

Try to remove the malware – if you can find a way to do this, it is the best option

Wipe the system(s) and reinstall from scratch – whilst you may not want to do it, sometimes this is the only way to recover your systems without paying

If you follow these instructions you will enhance your business’ cyber security by being able to prevent and deal with ransomware attacks.

With over 20 years of experience, Serviceteam IT design and deliver sophisticated connectivity, communication, continuity, and cloud services, for organisations that need to stay connected 24/7. We take the time to fully understand your current challenges, and provide a solution that gives you a clear understanding of what you are purchasing and the benefits it will bring you.

To find out how we can help you, call us on 0121 468 0101, use the Contact Us form, or why not drop in and visit us at 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.

We’d love to hear from you!

Are You Vulnerable to a Ransomware Cyber Attack?

Ransomware cyber attacks could leave you and your business without access to crucial IT services. Heres how to deal with and prevent them.

Ransomware is a type of malware that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. It came to public attention in the UK with the 2017 WannaCry attack that crippled the IT systems of several large organisations, most notably the NHS.

Preventing attacks before they happen is the best way to protect yourself. You can do this by:

Defending your email against ransomware—email phishing and spam are the main way that ransomware is distributed. Secure Email Gateways with targeted attack protection are crucial for detecting and blocking malicious emails that deliver ransomware. These solutions protect against malicious attachments, malicious documents, and URLs in emails delivered to user computers.

Defending your mobile devices against ransomware—mobile attack protection products, when used in conjunction with mobile device management (MDM) tools, can analyze applications on users’ devices and immediately alert users and IT to any applications that might compromise the environment.

Defending your web browsing against ransomware—secure web gateways can scan users’ web traffic to identify malicious adverts that might lead to ransomware.

Monitor your server, network and back up key systems—monitoring tools can detect unusual file access activity, viruses, network C&C traffic and CPU loads, possibly in time to block ransomware from activating. Creating a full image copy of crucial systems can reduce the risk of a crashed or encrypted machine causing a crucial operational bottleneck.

If you do fall victim to an attack you should:

1 — Isolate the Infection: The rate and speed of ransomware detection is critical in combating fast moving attacks before they succeed in spreading across networks and encrypting vital data.

2 — Identify the Infection: Most often the ransomware will identify itself when it asks for ransom. There are numerous sites that help you identify the ransomware, including ID Ransomware. The No More Ransomware! Project provides the Crypto Sheriff to help identify ransomware.

3 — Report to the Authorities: You’ll be doing everyone a favor by reporting all ransomware attacks to the authorities. Victim reporting provides law enforcement with a greater understanding of the threat, provides justification for ransomware investigations, and contributes relevant information to ongoing ransomware cases.

4 — Determine Your Options:

Your options when infected with ransomware are:

Pay the ransom – this is not advised because it can make you a target in the future

Try to remove the malware – if you can find a way to do this, it is the best option

Wipe the system(s) and reinstall from scratch – whilst you may not want to do it, sometimes this is the only way to recover your systems without paying

If you follow these instructions you will enhance your business’ cyber security by being able to prevent and deal with ransomware attacks.

With over 20 years of experience, Serviceteam IT design and deliver sophisticated connectivity, communication, continuity, and cloud services, for organisations that need to stay connected 24/7. We take the time to fully understand your current challenges, and provide a solution that gives you a clear understanding of what you are purchasing and the benefits it will bring you.

To find out how we can help you, call us on 0121 468 0101, use the Contact Us form, or why not drop in and visit us at 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.

We’d love to hear from you!

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply