Remember
Register
TechnoConnect
Home
Blogs
Questions
Unanswered
Tags
Users
Ask a Question
TechnoBind
Events
Similar Questions
What is data protection in transit vs data protection at rest?
What are the segmentation of Data Protection as a Service (DPaaS) market?
What is the legal difference between Data Protection and Data Privacy?
What do the 8 data protection principles in the DPA cover?
Who polices Data Protection and what are the penalties for getting it wrong?
Ransomware Protection
0
votes
395
views
What are the factors needs to consider to protect organization from Ransomware?
data protection
data security
posted
Nov 2, 2021
by
Prashant Honashetti
Looking for an answer? Share this question: #
*Back up all data. Back up your company’s data regularly. If something goes wrong, you should be able to quickly and easily revert to a recent backup. This won’t protect you from being the target of an attack. But if you’re ever attacked, the fallout *won’t be nearly as devastating.
*Keep software updated. Ransomware attackers sometimes find an entry point within software by exploiting any vulnerabilities. Fortunately, some developers actively search for new vulnerabilities and patch them. Adopt a patch management strategy and ensure that all team members are constantly aware of the latest updates. WannaCry relies on unpatched systems to spread. The patches for the vulnerability have been around for four years, yet evidently many organizations still haven’t applied them.
*Use better threat detection. Most ransomware attacks can be detected and resolved before it’s too late. To maximize your chances of protection, have an automated threat detection system in place.
*Adopt multi-factor authentication. Multi-factor authentication forces users to verify their identities in multiple ways before they’re granted access to a system. If an employee’s password is ever leaked to a criminal, the attacker won’t be able to gain easy access to your systems.
*Use the principle of least privilege. Employees should never have more access to data than they truly need. Segmenting your organization and restricting access can provide a kind of quarantine effect, minimizing the impact of a potential attack and limiting the vectors of access.
*Scan and monitor emails and file activity. Emails are the default choice of cybercriminals running phishing schemes. Scan and monitor emails on an ongoing basis, and consider deploying an automated email security solution to block malicious emails from reaching users. Also, consider scanning and monitoring file activity.
*Improve employee training. Most ransomware attacks are the by-product of bad employee habits or pure ignorance. Someone may voluntarily give out their password or download an unfamiliar file. With better employee training, the chances of this happening are much lower.
Please
log in
or
register
to answer this question.
Similar Questions
0
votes
What is data protection in transit vs data protection at rest?
0
votes
What are the segmentation of Data Protection as a Service (DPaaS) market?
0
votes
What is the legal difference between Data Protection and Data Privacy?
0
votes
What do the 8 data protection principles in the DPA cover?
0
votes
Who polices Data Protection and what are the penalties for getting it wrong?
...