Ransomware Resistance

Five Steps to Raising Ransomware Resistance

April 4, 2017Categories: News. Tags: ransomware, root out ransomware, and Security.

Five Steps to Raising Ransomware Resistance

Ransomware Resistance : RANSOMWARE ATTACKS ARE not only becoming more common—they’re becoming more creative. This advanced malware that once targeted users directly is now being deployed via remote exploits of unsecured web servers running WordPress and, now, JBoss. According to Cisco’s Talos threat intelligence organization, a new type of ransomware called SamSam is targeting enterprises running vulnerable versions of JBoss. Rather than the ransomware infection spreading through phishing attacks or drive-by downloads, it attacks a compromised server and spreads throughout the internal corporate network. This is just one example of a myriad of highly complex threats targeting corporate assets and resources every day. Ransomware appears to be coming of age.

So, what can enterprises do to protect themselves from an initial ransomware infection? If ransomware gets into one system, how can enterprises stop it from spreading to others? It all comes down to common sense. The ransomware threat is no different than any other threat; there’s a vulnerability, and the criminals want to exploit it for ill-gotten gains. The method and underlying technologies evolve, but the threat itself needs to be handled in the same manner as any other threat. Here’s how enterprises can approach this security challenge for an initial ransomware resistance:

  1. Acknowledge that you don’t know what you don’t know. The sign of a truly wise security professional is admitting that many things on the network are unknown. Systems, applications, users, information and the like all make up a group of assets that are often unaccounted for and, therefore, under-secured and currently at risk to ransomware. Another key indicator of a smart security pro is the presence of a plan to make things better.
  2. Acquire support from management and users. Before anything can get off the ground in security, management needs to politically and financially back it, and they need to do so on an ongoing basis. Assuming the security team is able to get management on board with their plan for fighting ransomware, they’ll also need to get the users on board with policies, ramifications of bad choices and the overall setting of expectations.
  3. Deploy the proper technologies or tweak your existing setup. The heart of a strong malware defense is well-designed and properly implemented technologies. If a network is to stand up against a modern-day ransomware infection, it needs to have a few things:
    • First and foremost, patching needs to be under control. Many businesses struggle with this, especially with third-party patches for Java and Adobe products, and hackers love this. Until software updates are deployed in a timely fashion, the organization is a sitting duck. A network is just one click away from compromise.
    • Effective malware protection is also a necessity. Steer away from the traditional, and look more toward advanced malware tools, including non-signature or cloud-based antivirus, white-listing, and network traffic monitoring and blocking technologies.
    • Data backups are critical. Organizations’ systems are only as good as their last backup. Discussions around backups are boring, but they need to be well-thought-out to minimize the impact of the ransomware that does get through and encrypts critical assets.
      Network segmentation is another important part of ransomware resistance and protection, but it’s only sometimes deployed properly. Just keep in mind that virtual LANs—the most common segmentation technique—aren’t secure if an internal user can guess the IP addressing scheme that’s likely a mere digit increment or decrement away.
    • Finally, security assessments can help protect enterprise networks. Stop pen testing for the sake of the Payment Card Industry Data Security Standard, and start performing comprehensive security vulnerability assessments that look at the bigger picture. If the security team keeps malware in mind when it looks at its internal network from the internet, it’ll find a slew of weaknesses that are currently facilitating the ransomware infection threat. Document these findings and present them to management for the necessary support.
  4. Monitor and respond. Security teams can’t secure—or respond to—things they don’t acknowledge. Most enterprises have a half-baked monitoring, alerting and incident response program. Security teams need to do what needs to be done: monitor servers, workstations and networks for anomalies; take quick action; and do what’s necessary to respond to the current event and prevent it from reoccurring.
  5. Fine-tune to get better. Many people—both in management as well as IT and security—view security as a one-time deal: You invest, you deploy, you assess and everything else will take care of itself. But this is hardly the case. IT and security teams are pressed for time because they’re constantly having more projects layered on top of what is still left undone. Figure out a way to fix that. It may be in terms of time management, different processes or hiring new employees. Whatever it is, fix it.

The security solutions to a ransomware infection are not endpoint-centric, as Cisco’s Talos report showed, nor are they network-centric. They’re holistic. It’s a little bit of everything—in various parts of the organization—working together to create barriers to entry and exploit. Sound familiar? It’s the same tried-and-true approach to information security that’s been known for decades, yet organizations continue to struggle with it. The technical understanding is there, but security is impeded by politics and special interests. From the CIO to the chief learning officer to the CEO and a lot of people in between, everyone involved has his or her own agenda that keeps what needs to be done from getting done.

An organization might not be able to overcome the human aspects of information security, but it can at least try to make the criminal hacker’s job as difficult as possible.


Related Posts

ransomware recovery

Ransomware Recovery Starts With a Data Strategy

April 5, 2017

Stopping ransomware may be an almost impossible act for IT organizations. But recovering from ransomware should not be. A key facet to successful ransomware recovery is a solid data protection strategy.

ransomware for security priority

Why You Must Make Ransomware a Security Priority

April 3, 2017

One of the reasons why security priority on ransomware has become so popular lies in the simplicity of the business model used by cyber-criminals

Is your organization prepared for a Ransomware attack?

December 28, 2016

Successfully defending your organization against ransomware attack takes preparation and an understanding of what to look for if an attack begins.

Leave a Reply

Your email address will not be published. Required fields are marked *