{"id":409,"date":"2021-06-25T08:01:28","date_gmt":"2021-06-25T07:01:28","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=409"},"modified":"2021-06-25T08:01:28","modified_gmt":"2021-06-25T07:01:28","slug":"six-steps-to-protect-your-organization-from-ransomware","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/six-steps-to-protect-your-organization-from-ransomware\/","title":{"rendered":"Six Steps to Protect Your Organization from Ransomware"},"content":{"rendered":"\n<p>The days of ransomware attackers demanding a few hundred dollars for a decryption key are long gone. Attacks have gotten more severe, and perpetrators have become bolder, demanding multimillion-dollar payouts from their victims.<\/p>\n\n\n\n<p>Paying ransom, however, may solve one company\u2019s problems but could make it worse for everybody else. \u201cIn some recent cases of ransomware attacks, the victim organizations have paid huge amounts to the attackers, which can be one of the reasons these attacks are getting more popular,\u201d says&nbsp;<a href=\"https:\/\/www.gartner.com\/analyst\/89434\">Paul Webber<\/a>, Senior Director Analyst, Gartner.<\/p>\n\n\n\n<p>Instead of paying, he says, organizations should place a stronger focus on preparation and early mitigation. Gartner has issued a document listing <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/6-ways-to-defend-against-a-ransomware-attack\/\">six ways to defend against ransomware<\/a> threats:<\/p>\n\n\n\n<p><strong>1. Initial Assessments<\/strong><\/p>\n\n\n\n<p>Conduct risk assessments and penetration tests to determine the organization\u2019s attack surface and what tools, processes and skills are in place to defend against attacks.<\/p>\n\n\n\n<p><strong>&nbsp;2. <\/strong><strong>Ransomware Governance<\/strong><\/p>\n\n\n\n<p>Before preparing a technical response, be sure to implement processes and compliance procedures involving key decision makers such as the CEO, board of directors and other stakeholders. If an attack occurs, Gartner notes, the press is likely to contact company directors, not the CISO.<\/p>\n\n\n\n<p><strong>3. Consistent Operational Readiness<\/strong><\/p>\n\n\n\n<p>To verify the effectiveness of existing security controls, conduct tests and drills \u201cat regular intervals to check for vulnerabilities, noncompliant systems and misconfigurations.\u201d<\/p>\n\n\n\n<p><strong>4. Data Backup<\/strong><\/p>\n\n\n\n<p>Back up all data as well as \u201cevery nonstandard application and its supporting IT infrastructure,\u201d and test the backup and recovery to ensure they can handle an attack. Be sure to use controls that prevent online backups from becoming encrypted by ransomware.<\/p>\n\n\n\n<p><strong>5. Least Privilege<\/strong><\/p>\n\n\n\n<p>Implement least-privilege practices by restricting permissions, removing local administrator rights from end users, and preventing installation of applications by standard users. Multifactor authentication should be in place wherever possible, especially for privileged accounts.<\/p>\n\n\n\n<p><strong>6. User Training<\/strong><\/p>\n\n\n\n<p>Educate users on ransomware response actions based on guidance provided by government and regional authorities. Customize training to company needs. \u201cUse cyber crisis simulation tools for mock drills and training that provide closer to real-life situations for better preparedness of end users against ransomware,\u201d says Webber. <a rel=\"noreferrer noopener\" href=\"https:\/\/blog.isc2.org\/isc2_blog\/2021\/06\/six-steps-to-protect-your-organization-from-ransomware-ransomwareweek.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+isc2Blog+%28%28ISC%292+Blog%29\" data-type=\"URL\" data-id=\"https:\/\/blog.isc2.org\/isc2_blog\/2021\/06\/six-steps-to-protect-your-organization-from-ransomware-ransomwareweek.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+isc2Blog+%28%28ISC%292+Blog%29\" target=\"_blank\">Source<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">How Can ITM Help You?<\/h5>\n\n\n\n<p>iTM covers all aspects of Cyber Security including but not limited to Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations, Cloud security best practice &amp; architecture and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey. <a rel=\"noreferrer noopener\" href=\"https:\/\/www.itminister.co.uk\/contact.html\" target=\"_blank\">Contact Us <\/a>for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The days of ransomware attackers demanding a few hundred dollars for a decryption key are long gone. Attacks have gotten more severe, and perpetrators have become bolder, demanding multimillion-dollar payouts from their victims. Paying ransom, however, may solve one company\u2019s problems but could make it worse for everybody else. \u201cIn some recent cases of ransomware &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/six-steps-to-protect-your-organization-from-ransomware\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Six Steps to Protect Your Organization from Ransomware&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[16,17,18,23,10],"tags":[],"class_list":["post-409","post","type-post","status-publish","format-standard","hentry","category-cyber-crime","category-cyber-risk","category-cyber-security-best-practice","category-cyber-security-research","category-ransomware"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=409"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/409\/revisions"}],"predecessor-version":[{"id":410,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/409\/revisions\/410"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}