Many cyberattacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare (along with many other industries), preventing critical information and systems for patient care from being accessed, for example.
ConvergeOne never advocates paying the ransom to cybercriminals. You are paying a criminal organization to extend their attack infrastructure further, rather than putting them out of business. Instead, you should build a cyber-aware culture within your organization and proactively follow a number of steps to keep your information and people protected from cyberattacks.
As we plan for 2023, here are 3 tips to help your organization defend against ransomware.*
“Dwell time” is a saying meant to describe how long an intruder is sitting within your network and collecting Information before you notice it.
The average dwell time is 210 days before you even realize that a cybercriminal has infiltrated your network! By employing a Managed Detection and Response (MDR) plan into your environment, you can be made aware of traffic that is outside the normal range (anomalies) and increase your threat-hunting capabilities. This will allow for visibility throughout and will help you act when needed.
We also often see a Remote Access Trojan (i.e., a RAT) included with ransomware that is hard to locate and eradicate. A RAT is malware that includes a back door for administrative control over the target systems. RATs are usually downloaded invisibly with other malware, like ransomware. Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet or use it as a future entry point even after the ransomware portion of the payload has been thwarted.
We’ve all heard, “It’s not if it happens, but when it does, are you prepared?” IRPs are key to a company’s ability to respond to an incident (malware, ransomware, DDOS, etc.) in an expeditious manner. Having a strong program in place allows for key role expectations and communication plans, both internally and externally, and the ability to understand actionable items via well-planned tabletop exercises.
*These 3 ransomware tips are part of ConvergeOne’s white paper: 23 Cyber Security Tips for 2023, by Chris Ripkey and Vito Nozza. You can check out all 23 tips covering Zero Touch, Cloud Security, Risk Management and more in the complete white paper. Access it now.
Schedule a Ransomware Readiness Workshop today. The workshop focuses on your readiness to respond to a ransomware attack. During this workshop, ConvergeOne experts will analyze your environment for vulnerabilities and deliver best practices.