0% found this document useful (0 votes)
49 views12 pages

1805 StorageCraft Ransomware Ready Ebook

Only 4% of organizations feel very confident in their ability to defend against ransomware, with attacks increasing significantly since 2015. Ransomware, which locks users out of their data until a ransom is paid, poses a serious threat, particularly as 'Ransomware as a service' becomes more common. To combat this, businesses should educate employees, implement robust IT security measures, and establish a comprehensive Disaster Recovery plan.

Uploaded by

Yayat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views12 pages

1805 StorageCraft Ransomware Ready Ebook

Only 4% of organizations feel very confident in their ability to defend against ransomware, with attacks increasing significantly since 2015. Ransomware, which locks users out of their data until a ransom is paid, poses a serious threat, particularly as 'Ransomware as a service' becomes more common. To combat this, businesses should educate employees, implement robust IT security measures, and establish a comprehensive Disaster Recovery plan.

Uploaded by

Yayat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Are you Ransomware Ready?

4% of organisations say they are “very confident” of their


ability to protect themselves against ransomware attacks.

By deduction, 96% are not quite so confident.


Where does your business fit in?
What is Ransomware?
Ransomware is a type of malware that prevents you from accessing your
data until you pay a ransom.
The FBI estimates ransomware to be a $1-billion-dollar
The number of ransomware attacks have been growing rapidly since 2015. source of income for cyber criminals in 2016
In 2016, the occurrence of ransomware attacks nearly doubled, showing a
172% increase in the first half of 2016 compared to the whole of 2015.

This growth is being fueled by the rise of “Ransomware as a service”. This Considering the amount of income it
is a type of ransomware designed to be used by anyone with little or no generates, it’s safe to say that this won’t
technical knowledge.
go away anytime soon. For the safety
These agents simply download the virus either for free or for a nominal fee, set and health of your business, you need
a ransom and payment deadline, and attempt to trick someone into infecting to be aware of the risks and take the
his or her computer. If the victim pays up, the original author gets a cut - approx.
necessary appropriate steps.
5% to 20% - and the rest goes to the “script kiddie” who deployed the attack.
54%
Ransomware Percentage of UK
companies that have
The facts been hit by Ransomware

60%
of attacks demand ransoms of over $1,000
58% 63%
58% of UK companies
20% 63% experienced
pay up
severe downtime
of attacks asked for more than $10,000

32% 34%
1%
32% of UK companies lost 34% lost revenue as a
of attacks asked for over $150,000 files after refusing to pay result of the attack
Ransomware exploits a company’s
weakest link: their employees

39% 29% 42% 76%

39% of organisations hit 29% of companies 42% hit mid-level 76% of UK adults
by ransomware said it said that the attack managers don’t know what
came through an email hit lower-level staff ransomware is

Make Ransomware defense everyone’s responsibility.


Step 1
Educate your employees

Best practices should include:

Scrutinising links contained in emails and do Only download software - especially free Invest in training for staff so that they are
not open attachments included in unsolicited software - from sites you know and trust. aware of how ransomware works (including
e-mails. When possible, verify the integrity of the Phishing).
software through a digital signature prior to
execution.
Ensure application patches for the operating system, software and firmware are up to

Step 2 date, including Adobe Flash, Java, web browsers, etc.


.............................................................................................................................................................

Actions for your IT Department Ensure anti-virus and anti-malware solutions are set to automatically update and
regular scans are conducted.
/ IT Service Provider .............................................................................................................................................................

Disable macro scripts from files transmitted via e-mail. Consider using Office Viewer
software to open Microsoft Office files transmitted via e-mail instead of full Office
Suite applications.
..........................................................................................................................................................

Implement software restrictions or other controls to prevent the execution


of programs in common ransomware locations, such as temporary folders
supporting popular Internet browsers, or compression/decompression programs,
including those located in the AppData/LocalAppData folder.
....................................................................................................................................................

No users should be assigned administrative access unless absolutely needed.


Those with a need for administrator accounts should only use them when
necessary; they should operate with standard user accounts at all other
times.
Patch all endpoint device operating systems, software, and firmware as vulnerabilities

Step 2 continued... are discovered. This precaution can be made easier through a centralized patch
management system.
............................................................................................................................................................
Actions for your IT Department
Configure access controls with least privilege in mind. If a user only needs to read specific files, they
/ IT Service Provider should not have write access to those files, directories or shares.
.......................................................................................................................................................................................

Use virtualised environments to execute operating system environments or specific programs.


.....................................................................................................................................................................................

Categorize data based on organizational value and implement physical/logical separation of


networks and data for different organizational units. For example, sensitive research or business
data should not reside on the same server and/or network segment as an organization’s e-mail
environment.
..................................................................................................................................................................................

Require user interaction for end user applications communicating with websites uncategorized
by the network proxy or firewall. Examples include requiring users to type in information or
enter a password when the system communicates with an uncategorized website.
.....................................................................................................................................................................

Implement application whitelisting. Only allow systems to execute programs known and
permitted by security policy.
Step 3
Put a Disaster Recovery Plan in Place

In spite of all of the preventative measures you take -


you need to plan for the possibility that you will get hit.

“ We were hit and not because we were careless. In the face of a


targeted attack your preventative measures can (and often will) fall
short. When this happens you need to have a DR plan in place.

Jonathan Anstee - Scott Aerospace
Scott Aerospace successfully combatted a targeted Ransomware
attack using StorageCraft Technology as part of their Disaster Recovery plan.

A Disaster Recovery plan is your last line of defense.


StorageCraft Technology has been the bedrock of Disaster
Recovery solutions for over 10 years across 4 continents.
Drawing on our extensive experience here is what a good Disaster Recovery plan
should have:

1. Backup
All backups are not the same. Here is what to look for in a backup.

A Image based snap shot technology is best of breed D You need to make sure that your whole environment / workforce
Important note - There are still a lot of companies backing up to tape - this is hugely are being backed up - including your remote workers and any SaaS
unreliable. Tapes get corrupted and wiped very easily. We hear horror stories all of the applications you are using (e.g. Office 365 / G Suite)
time of companies failing to restore from tape. Be warned!
E Ensure that your backups are not connected to the networks that
B You need to be able to backup as often as appropriate (every 15
they are backing up
minutes for critical data)

C Being able to easily verify that your backups work

continued over >


What a good Disaster Recovery plan should have (continued)

2. Offsite Replication 3. Testing 4. Recovery


It is essential that you replicate your backups You MUST be able to test your Disaster It may seem obvious but sadly this is
off site to ensure business continuity in the Recovery plan. Do not let a disaster be your where a lot of so called “Disaster Recovery
event of a site issue. first test. solutions” fail. Your Disaster Recovery must
be able to recover your data every time and
Backing up locally just might not be enough A good Disaster Recovery plan will be easy on time.
should a more destructive ransomware to test (and test often).
attack shared folders on your NAS boxes When a disaster like Ransomware hits, you
by accessing file services on your PCs. This is the only way that you can validate want to be 100% confident that you can
The best way to prevent this is to have that your recovery time objectives can be recover your data and get on with the job!
uninfected backup versions stored in an met.
offsite location.

A good Disaster Recovery solution will


replicate your data to a location of your
choice (maybe that’s a second site within
the company; or maybe a private or public
cloud) and replicate to a schedule that suits
you.
Conclusion
There is no silver bullet in dealing with Ransomware. The best approach
is a multilayered one, incorporating educating staff; keeping your
anti-virus software up-to-date; regularly software patching and most
importantly having a robust and tested Disaster Recovery plan in place.
APAC contact details:
Australia
sales@storagecraft.com.au
StorageCraft Technology is an award winning developer +612 8061 4444
of Business Continuity and Disaster Recovery solutions. www.storagecraft.com/au
We work with a global partner network of managed
New Zealand
service providers (MSPs) and value-added resellers sales@storagecraft.co.nz
(VARs) who deliver the StorageCraft Recovery Solution 0800 89 1234
to end users around the world. www.storagecraft.co.nz

Business continuity starts here. Asia


asiasales@storagecraft.com.au
www.storagecraft.com/au
Sources
https://blog.barkly.com/ransomware-statistics-2016

http://www.computerweekly.com/news/450303068/UK-organisations-still-not-taking-ransomware-seriously

https://sentinelone.com/article/freedom-information-requests-reveal-6-10-universities-ransomware-victims-almost-23-targets-hit-multiple-times/

https://success.trendmicro.com/solution/1112223-ransomware-solutions-best-practice-configuration-and-prevention-using-trend-micro-products

http://www.cbronline.com/news/mobility/security/10-shocking-ransomware-stats-54-of-uk-companies-hit-by-ransomware-attacks-4970214/

http://www.itgovernance.co.uk/blog/ransomware-attacks-strike-hard-54-of-businesses-in-the-uk-hit/

http://uk.businessinsider.com/ransomware-as-a-service-is-the-next-big-cyber-crime-2015-12?r=US&IR=T

You might also like