Firewall News

Top Menu

  • Home
  • Our Blog
  • Contact Us

Main Menu

  • Software Updates
  • Alerts & Bugs
  • Out of the Box
  • Home
  • Our Blog
  • Contact Us

Firewall News

Firewall News

  • Software Updates
    • WatchGuard logo

      TDR 6.0.0 is now integrated into WatchGuard Cloud

      04/01/2021
      0
    • Sophos Logo

      XG Firewall 17.5 MR14 Released

      30/07/2020
      0
    • Sophos Logo

      Sophos Firewall Manager SFM 17.1 MR4 Released

      27/07/2020
      0
    • Sophos Logo

      Sophos Enterprise console - Endpoint Security and Control v10.8.9 for Windows has ...

      16/07/2020
      0
    • Sophos Logo

      Sophos iView v3 MR-2 Released

      07/07/2020
      0
    • Sophos Logo

      SD-RED Firmware 3.0.002 Pattern Update

      06/07/2020
      0
    • Sophos Logo

      XG Firewall 17.5 MR13 Released

      06/07/2020
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for old firmware v17 and v17.1 for XG Firewall

      03/07/2020
      0
    • WatchGuard logo

      Fireware 12.5.4 Now Available

      01/07/2020
      0
  • Alerts & Bugs
    • Sophos Logo

      Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

      29/03/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Updates

      03/03/2022
      0
    • WatchGuard logo

      WatchGuard Support Alert

      23/02/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Reminder

      03/02/2022
      0
    • Sophos Logo

      Sophos: Product Lifecycle Information: Extended Support for Windows 7 and Windows Server ...

      31/01/2022
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for Sophos SSL VPN Client

      29/11/2021
      0
    • WatchGuard logo

      WatchGuard: macOS Monterey 12.0.1 Does Not Support the AuthPoint Logon App

      09/11/2021
      0
    • Sophos Logo

      Sophos UTM Manager (SUM) End of Distribution

      04/11/2021
      0
    • WatchGuard logo

      WatchGuard: End of Sale Notice: AP420

      01/11/2021
      0
  • Out of the Box
    • WatchGuard’s Firebox T80 Earns 5-Star Rating in SC Labs Review

      17/11/2020
      0
    • WatchGuard Wins Big in CRN 2020 Tech Innovator Awards

      16/11/2020
      0
    • Coronavirus scams: what to look for and how to stop them

      02/04/2020
      0
    • Dell SonicWALL TZ 300

      Out the Box - Dell SonicWALL TZ 300

      05/07/2016
      0
    • Dell SonicWALL TZ SOHO

      Out the Box - Dell SonicWALL TZ SOHO

      05/07/2016
      0
    • WatchGuard Firebox T50

      WatchGuard Firebox T50

      31/03/2016
      0
    • WatchGuard Firebox M200

      WatchGuard Firebox M200

      31/03/2016
      0
News
Home›News›10 Steps Organizations Can Take in the Fight Against Ransomware

10 Steps Organizations Can Take in the Fight Against Ransomware

By admin
12/11/2019
1418
0
Share:

As threat research reports continue to demonstrate, ransomware is a popular method of attack for cyber criminals due to the financial benefits it presents. From large scale attacks to those that are more targeted, the threat of ransomware can be a looming presence that forces organizations to wonder when, not if, it will impact them. 

By adopting certain best practices and taking the right precautions, organizations can not only reduce the impact of a successful attack but also prevent future attacks. 

10 Ways to Defend Against Ransomware

Here are 10 steps that organizations should consider if they are to protect their employees, their customers, and their reputation. 

  1. Identify what needs protection: Identifying business-related assets – including various systems, devices, and services – across the environment and maintaining an active inventory is critical in any security strategy. By taking these steps, organizations can recognize where they are most vulnerable, prioritize assets, and establish a plan for recovery.
           
  2. Don’t underestimate patching: While the concept of patching and implementing regular upgrades seems basic, many organizations seem to gloss over this step entirely. If a system cannot be taken offline to be patched, it should be secured using inflexible proximity controls in addition to a zero-trust or isolation strategy. If these strategies cannot be implemented, organizations should consider replacing systems altogether, where possible. 

  3. Ensure security solutions are up to date: To stay ahead of these attacks, security teams must ensure their security systems are up to date, especially their secure email gateway since that is where the majority of ransomware attacks originate, enabling it to effectively stifle threats before they reach victims. Additionally, any good ransomware defense strategy should leverage machine learning, application whitelists, and robust password policies  that require the use of multifactor authentication to keep threats at bay.
     
  4. Network segmentation: This strategy guarantees that malware and compromised systems will be contained to a specific section of the network. By taking this step, organizations can also segregate intellectual property and personal data in order to keep that information secure in the case of a successful attack.  

  5. Prioritize extended network security: In order to prevent security gaps, organizations must confirm that solutions which are deployed within the main network are also deployed within the extended network – this includes OT networks, branch offices, and the cloud. Security teams should also analyze connections from customers, partners, or vendors to ensure that proper controls and filters are in place. If there is any possibility that malicious content could be extended to these connections, partners should be made aware.

  6. Avoid compromised systems: Organizations must regularly back up their data and store this information offline in order to avoid compromise in the case of a breach – and these backups should also be analyzed for signs of malware. In addition to performing backups, security teams should isolate critical recovery systems, software, and devices so that they are readily available when needed.

  7. Practice makes perfect: By performing regular recovery drills, organizations can ensure that their backed-up data is accessible and systems can be restored after an attack takes place. These drills also present the opportunity for individuals across the organization to understand their duties – if any issues arise during this time, concerns must be addressed and recovery strategies updated immediately. 

  8. Enlist outside help: In the event of a compromise, organizations should have a list of security and networking experts and consultants that can aid in the recovery process, as well as law enforcement, media consultants, and legal teams; many of these individuals should also be involved in recovery drills. 

  9. Keep on top of industry news: Organizations should make it a point to continually educate teams about current ransomware threats in order to take lessons learned from successful attacks elsewhere and apply them to internal security strategies.

  10. Improve awareness: By providingregular training updates in the form of videos, simulations, or educational posters, organizations can ensure their first line of cyber defense – employees – is strong enough to ward off threats.  

Final Thoughts

While the thought of ransomware can cause panic, it is not impossible to overcome. By taking the appropriate steps and ensuring that each individual understands what needs to be done, organizations can keep their employees, customers, and partners protected, ensure that critical data is not compromised, and get systems back up and running with minimal downtime.

This is a summary of an article written for Threatpost by Fortinet’s Chief of Security Insights and Global Threat Alliances, Derek Manky. The entire article can be accessed here.

Previous Article

Trend Micro Launches Comprehensive Smart Factory Security ...

Next Article

Meraki – INTRODUCING THE EARLY ACCESS DEVELOPER ...

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0

Related articles More from author

  • NewsSonicWALL

    10 Reasons to Upgrade to the Newest SonicWall TZ Firewall

    30/10/2019
    By admin
  • News

    ARRIS to acquire Ruckus Wireless and ICX SWITCH Business for $800 Million in Cash

    22/02/2017
    By admin
  • SonicWall Logo
    NewsSonicWALL

    SONICWALL CALLED UPON BY HEALTH GIANT GNC TO RAPIDLY PROVIDE PROTECTION OF REMOTE, MOBILE WORKFORCE

    06/05/2020
    By admin
  • Fortinet
    FortinetNews

    Tata Communications Transformation Services Limited (TCTS) and Fortinet set to enable service providers to accelerate revenue with the launch of ...

    21/11/2019
    By admin
  • SonicWall split from Dell
    News

    SonicWall thrives after Dell split

    27/06/2017
    By admin
  • News

    Six Steps for Securing Your Remote Workforce at Scale

    12/03/2020
    By admin

  • WatchGuard logo
    News

    WatchGuard Wi-Fi Cloud Analytics & Engagement

  • Fortinet
    FortinetNews

    Fortinet Acquires Cloud Security and Networking Innovator OPAQ Networks

  • Sophos Intercept X threat researcher
    News

    Sophos – Intercept X: the threat researcher’s view

Timeline

  • 29/03/2022

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

  • 03/03/2022

    Sophos: Important Product Lifecycle Updates

  • 01/03/2022

    Shoring up your cybersecurity posture in light of ongoing crisis

  • 23/02/2022

    WatchGuard Support Alert

  • 03/02/2022

    Sophos: Important Product Lifecycle Reminder

Sponsored Links

Latest Comments

  • Paul Sillars
    on
    21/06/2016
    I received this in an email this morning, it was the first I heard about it ...

    Dell Software Group sold to help fund looming EMC deal

  • Paul Sillars
    on
    20/06/2016
    This is going to be an interesting one to watch. Especially after today's announcement that ...

    Ingram Micro gets distribution access to Dell’s security range in Australia

Find us on Facebook

Firewall.News Logo

This site serves more as a reference point for some of the major security vendor's updates and product/press releases

It will never be a definitive list, but it helps our customers keep up to date and also allows us to express our comment and observations as well.

About us

  • PO Box 451, North Lakes, Queensland, 4509, Australia
  • [email protected]
  • Recent

  • Popular

  • Comments

  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Sophos Logo

    Sophos: Important Product Lifecycle Updates

    By admin
    03/03/2022
  • Shoring up your cybersecurity posture in light of ongoing crisis

    By admin
    01/03/2022
  • WatchGuard logo

    WatchGuard Support Alert

    By admin
    23/02/2022
  • Dell SonicWALL Supermassive

    Ingram Micro gets distribution access to Dell’s security range in Australia

    By admin
    14/06/2016
  • Francisco Partners and Elliott Management to Acquire the Dell Software Group

    Dell Software Group sold to help fund looming EMC deal

    By admin
    21/06/2016
  • WatchGuard Firebox M500 – The Cure for HTTPS Performance Headaches

    By admin
    05/03/2015
  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Paul Sillars
    on
    21/06/2016

    Dell Software Group sold to help fund looming EMC deal

    I received this in ...
  • Paul Sillars
    on
    20/06/2016

    Ingram Micro gets distribution access to Dell’s security range in Australia

    This is going to ...

Follow Me

  • Contact
  • About Us
  • Home