Skip to main

5 Ways to Deliver A Deadly Counterpunch to #Ransomware

Download Point of View
5 Ways to Deliver A Deadly Counterpunch to #Ransomware

Overview

By putting in place sound preventative measures, understanding the Cyber Kill Chain®, and knowing how to respond to a breach, you can lower your risk of infection and reduce the impact of a breach. Your goal is to be prepared with a plan if a breach occurs so it does not become a newsworthy and costly incidence by fending off the majority of attacks and dealing swiftly and smoothly with those that do manage to penetrate your defenses, you will help keep your business on track, your customers and employees protected, and your reputation intact.

With phishing sites growing by 640% in 20191, 65% of ransomware attacks delivered via phishing2 and 90% of corporate data breaches being caused by human error3, the threat of ransomware hangs over every IT professional. The average cost of a breach ranges from $5.11 million for large organizations to $2.65 million for smaller organizations. The global cost to victims of ransomware is estimated to be $20 billion in 2020.

Ransomware is a specific type of malware designed to encrypt a computer’s content until the user pays to get the recovery key. This effectively halts productivity, impacting business revenue. However, IT professionals can take decisive action to minimize both the threat and the impact of ransomware. Here, we define the preventative steps that can be taken to protect the enterprise against ransomware, examine how to limit the impact of a breach, explore where an in-process attack can be stopped, and discuss what to do if a hacker succeeds in gaining access.

1. Protect the Enterprise

2. Minimize the Impact

3. Break the Cyber Kill Chain®

4. Respond to an Attack

5. Lessons Learned


1 2020 Webroot Quarterly Threat Report, February 2020

2 IDAgent.com, July 2020

3 TechradarPro.com, May 2019

Mathew Newfield

Mathew Novo campo

Vice-presidente sênior e diretor de segurança e infraestrutura (CSIO) da Unisys. A organização da CSIO é composta pelas antigas organizações Unisys Information Technology (UIT) e Chief Information Security Office (CISO). Ela é responsável por fornecer soluções seguras que permitam à empresa atender aos seus clientes de forma mais eficaz e por fornecer serviços internos de TI e segurança em toda a empresa.