These are five best practices for surviving a ransomware attack

Every 11 seconds, a ransomware attack occurs. Organizations now face the daunting reality that no longer is the question “if” a ransomware attack will happen; now, it is only a matter of “when” they will get hit. Is there anything you can do when you know the enemy is at the gate? The answer is a resounding “Yes.” The steps your organization takes (or doesn’t) can make a difference in preventing attacks and mitigating damage. What you do now will impact your business continuity as well as the speed of your recovery. Learn the five best practices to help your organization survive a ransomware attack.

https://techaeris.com/wp-content/uploads/2021/10/ransomware-attacks-moneybags.jpg?ezimgfmt=ng%3Awebp%2Fngcb1651

Protection against a ransomware attack can be boiled down to a few simple steps. While the steps are simple, implementing them and instilling the discipline to follow them is hard. The mindset needed should be developed and relentlessly followed. These steps not only protect an organization but also protect against any external threats.

Be ready to restore: Assume your systems and applications are rendered inoperable. Feeling helpless versus starting the recovery process depends on your readiness and access to quality backups. Create a reliable and “air-gapped” backup for all your critical systems. Test them often. Execute and stress test the recovery process. Remember, the organization will be under severe duress when the event happens. The recovery process, timelines, and communication system should be well documented and understood—plan for a hiccup or a few. You are and remain in Control as long as the data is encrypted, and the backups are in place.

Assume that no user can be trusted. Insider threats are the next most significant cybersecurity concern after ransomware threats. This is because an insider threat is the most frequent means.

Practice 1: MFA

Attackers exploit the weakest link to gain access to your systems. Often this comes from stolen or phished credentials. Phishing attacks account for 22% of all breaches. Chances are your organization has already faced numerous phishing attempts; according to Proofpoint, over 75% of organizations experience a phishing attack. Criminals that are using these stolen credentials masquerade as legitimate users to slip through security. This same technique is used to access internal systems and upload infected files into trusted organizational data stores.

Multi-factor authentication (MFA) makes it harder to use stolen credentials. MFA requires an additional factor, such as a secret key from a device or email confirmation, to allow the account access. MFA is commonly achieved through apps tied to the users’ phones. So even if they steal account credentials, the lack of MFA validation renders them useless.

Practice 2: Encryption

Protect your data: assume that every external security protection you have will fail. This usually happens when a ransomware attack hits you. What is your failsafe? What are you trying to protect? Use encryption to keep data protected at all times. This will be your failsafe when all else fails.

Encryption may not be your first thought for ransomware protection, but it’s essential. Traditional encryption solutions are inherently flawed as they only protect data while it is at rest or in motion. They do not protect data that is in use by keeping it encrypted – in use here refers to data that is being analyzed or queried. Due to this, encryption technology is often dismissed as a legacy security tool. However, revolutionary encryption solutions ensure data is protected all the time, regardless of where it is located – even while it is being queried or shared with downstream systems.

When attackers are being prevented from accessing, using, or releasing an enterprise’s data even after it’s stolen, an attacker has much less leverage to hold an enterprise at ransom. Data is rendered useless and cannot be released to the public.

Microsoft Office ransomware attack

Practice 3: Log and Usage Analysis

Monitoring what happens not just on your network level but also at the data level is crucial for detecting ransomware attacks early on. Organizations can identify suspicious behaviors using automated log collection and analysis tools. Many systems can use suspicious behavior as a trigger for alerts that indicate a potential attack. Traditionally, organizations had no means of detecting anomalies at the data level. Modern data protection technology allows organizations to detect repeated accessing of structured and unstructured data and alert security teams, and stop malicious behavior in its tracks via machine learning. Organizations can evaluate anomalies and review automated threat scores. This can be risk-based alerting, where attributes are included versus auto mitigation techniques derived from a data protection platform tied to current SIEM solutions.

Practice 4: Harden the Infrastructure

Security gaps can be deadly. Cybercriminals find existing vulnerabilities in your infrastructure and exploit them. According to Veracode, 80% of attacks use known vulnerabilities more than three years old. Many of these have existing patches to remediate risk, but the patches were never applied. Unpatched exploits invite attackers to help themselves to your valuable data or take your systems hostage.

Simple patch management is by far the most straightforward solution security boost. Numerous enterprise tools will automate the detection, distribution, and application of patches. Keeping systems and applications up to date removes an easy attack vector and helps keep cybercriminals out.

Practice 5: Backups

Security is not 100% bulletproof. Remember that no longer is the question “if” a ransomware attack will occur; it’s only “when.” The painful fact is that ransomware will sometimes get through your defenses despite proactive measures to prevent it. In these cases, the worst thing that an organization can do is to pay the ransom. Doing so only encourages the criminals and provides capital to continue funding the development of new exploits and more dangerous ransomware.

Instead, businesses need to have solid, recent backups for all of their critical assets. Taking periodic backups and storing them in a separate location creates insurance against data loss. Rather than paying the ransom, organizations can fall back to restoring backups once the infected systems are rebuilt. This is a critical part of your disaster recovery plan and ability to get systems back up and running as quickly as possible.

Wrap Up

Taking Control The foremost part of preventing ransomware is making your organization an unappealing, difficult to penetrate a target. Implementing simple practices that make it harder for bad actors to get in and deploy attacks reduce your risk. Taking a data-first approach that secures data at the data level in addition to securing the network level, organizations can continue daily business without concern that data is left vulnerable at the source. Attackers look for soft targets because they gain more with less work. The practices listed above are not complex and, in many cases, are already part of existing IT best practices. But, cutting corners and skipping any of these steps is an invitation that may result in your “when” being today.

About The Author

Purandar Das, President, Co-Founder as well as the Chief Security Evangelist of Sotero (www.soterosoft.com) has focused on using technology to solve business problems. Throughout his career, Purandar has been working on utilizing technology to solve complex business challenges. He adopts a pragmatic approach that enables business to leverage technology to achieve business goals and power growth.

Purandar started Sotero with the conviction that today’s data protection was deficient and that a better approach was needed to protect data. He is a firm believer that security, where the core focus is not the data, is not a viable option. Purandar is a graduate of Texas A&M University (MS – Mechanical Engineering) and Bangalore University (BS – Mechanical Engineering) and is based out of Massachusetts.


TOP