Stronger network security could be the key to preventing a ransomware infection. Here Five ways to prevent a ransomware infection through network security. This article will discuss Five ways to prevent a ransomware infection through network security.
Ransomware attacks are not only becoming more common, they’re becoming more creative. This advanced malware that once targeted users directly is now being deployed via remote exploits of unsecured web servers running WordPress. According to Cisco’s Talos threat intelligence organization, a new type of ransomware called SamSam is targeting enterprises running vulnerable versions of JBoss. Rather than the ransomware infection spreading through phishing attacks or drive-by downloads, it instead attacks a compromised server and spreads throughout the internal corporate network. This is just one example of a myriad of highly-complex threats targeting corporate assets and resources every day. Ransomware appears to be coming of age.
The ransomware threat is no different than any other threat; there’s a vulnerability and the criminals want to exploit it for ill-gotten gains. The method and underlying technologies evolve, but the threat itself needs to be handled in the same manner as any other threat. Here’s how enterprises can approach this security challenge:
1. Acknowledge that you don’t know what you don’t know
The sign of a truly wise security professional is admitting that many things on the network are unknown. Systems, applications, users, information and the like all make up a group of assets that are often unaccounted for and, therefore, undersecured and currently at risk to ransomware. Another key indicator of a smart security pro is the presence of a plan to make things better.
2. Acquire support from management and users
Before anything can get off the ground in security, management needs to politically and financially back it, and they needs to do so on an ongoing basis. Assuming the security team is able to get management on board with their plan for fighting ransomware, they’ll also need to get the users on board with policies, ramifications of bad choices and the overall setting of expectations on “this is how things work here.”
3. Deploy the proper technologies or tweak your existing setup
The heart of a strong malware defense is well-designed and properly-implemented technologies. If a network is to stand up against a modern day ransomware infection, it needs the following:
- Effective malware protection is also a necessity. Steer away from the traditional and look more toward advanced malware tools including non-signature/cloud-based antivirus, whitelisting and network traffic monitoring/blocking technologies.
- Data backups are critical. Organizations’ systems especially the servers that are at risk to ransomware infections — are only as good as their last backup. Discussions around backups are boring, but they need to be well-thought-out to minimize the impact of the ransomware that does get through and encrypts critical assets.
- Network segmentation is another important part of ransomware protection, but it’s only sometimes deployed properly. Just keep in mind that VLANs the most common segmentation technique aren’t secure if an internal user can guess the IP addressing scheme that’s likely a mere digit increment or decrement away.
4. Monitor and respond
Security teams can’t secure or respond to the things it doesn’t acknowledge. Most enterprises have a half-baked monitoring, alerting and incident response program. Security teams need to do what needs to be done: monitor servers, workstations and network for anomalies, take quick action, and do what’s necessary to respond to the current event and prevent it from reoccurring.
5. Fine-tune to get better
Many people both in management as well as IT and security view security as a one-time deal. You invest, you deploy, you assess and everything else will take care of itself, but this is hardly the case. IT and security teams are pressed for time because they’re constantly having more projects layered on top of what is still left undone. Figure out a way to fix that. It may be in terms of time management, different processes or hiring new FTEs. Whatever it is, fix it.
Feel free to contact E-SPIN for ransomware preventive and solution availability, performance and security monitoring and testing application.
To know more about Ransomware, please click on the link below: