• Zine
  • Anonymous
  • Green
  • IT
  • Gadgets
  • Tech
  • Cloud
  • Data
  • Network
  • Security
  • Hosting
    • Sunset Host Co
    • Radio Host Co
  • Media
    • WSCA News
    • Sunset Crypto
    • Sustainable Action Now
    • Life.Style Magazine
    • Sunset Daily
    • Sunset Music News
    • Pro Merch Sports News
    • Explore New Jersey
    • Explore NJ News
    • The Zine Weekly
Facebook Twitter Instagram
Thursday, May 19
Facebook Twitter Instagram
The Zine Weekly
  • Zine

    Mrs Hinch fans are sharing simple hack to get rid of flies during the heatwave – and it costs just 10p

    May 18, 2022

    Cloudways Review 2022: Features, Pricing & More

    May 18, 2022

    Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

    May 18, 2022

    Qualcomm and AMD collaborate to optimize FastConnect platform

    May 18, 2022

    Aqua Security creates first unified scanner for cloud native security

    May 18, 2022
  • Anonymous

    Mrs Hinch fans are sharing simple hack to get rid of flies during the heatwave – and it costs just 10p

    May 18, 2022

    Buffalo shooting suspect kept plans from family, he wrote

    May 18, 2022

    Femcels: The ‘involuntarily celibate’ women who say they are barred from sex and romance | Society

    May 17, 2022

    Eurovision 2022: Russian hackers targeted contest, say Italian police

    May 16, 2022

    How Netflix Is a Joke Addresses a Film Distribution Flaw

    May 14, 2022
  • Green

    Environmentalists oppose more life for California nuke plant

    May 18, 2022

    Scientists create renewable biocement made entirely from waste materials

    May 16, 2022

    Proposed improvements to SiC MOSFET power converter technology overcome existing challenges

    May 14, 2022

    Emerging hydrogen storage technology could increase energy resilience

    May 11, 2022

    Microgrid demo to lend a helping hand in India’s green energy transition

    May 9, 2022
  • IT

    Cloudways Review 2022: Features, Pricing & More

    May 18, 2022

    Query event logs with PowerShell to find malicious activity

    May 18, 2022

    Indian Tablet Market Grew 68 Percent in Q1 2022 With Lenovo on Top: Cybermedia Research

    May 17, 2022

    How to download YouTube videos

    May 16, 2022

    Roe v. Wade reversal could hinder data privacy rights

    May 16, 2022
  • Gadgets

    Vi Data Delight Offer With Monthly Extra Data Launched for Hero Unlimited Prepaid Plans: Details

    May 18, 2022

    Google is remaking search, maps for the TikTok generation

    May 17, 2022

    Apex Legends Mobile Review: The Resemblance Is Uncanny

    May 16, 2022

    Our study suggests they boost intelligence in children

    May 16, 2022

    Realme TechLife Watch SZ100 India Launch Date Set for May 18, Teased to Offer Up to 12-Day Battery Life

    May 15, 2022
  • Tech

    My Favorite Things on the Internet

    May 17, 2022

    Two Twitter bosses ousted ahead of Elon Musk $44bn takeover

    May 13, 2022

    4D composite printing could improve the wings of drones

    May 11, 2022

    How to delete unused styles using VBA in Word

    May 9, 2022

    Best Gas Credit Cards in May 2022

    May 6, 2022
  • Cloud

    Aqua Security creates first unified scanner for cloud native security

    May 18, 2022

    Innovatrics, Blaize partner on AI ready-to-deploy facial recognition technology

    May 17, 2022

    To Drive Technological Progress, We Need Worker Power

    May 16, 2022

    The age of discontinuity | The Manila Times

    May 15, 2022

    Alibaba Cloud-UCSI to support digital economy

    May 15, 2022
  • Data

    Elon University / Today at Elon / #ElonGrad 2022 spotlight: Grace Holmes, exercise science

    May 18, 2022

    1547 adds capacity to Orangeburg, NY, data center

    May 17, 2022

    Real-time Analytics News for Week Ending May 14

    May 16, 2022

    Greatest REIT Wannabes Of All-Time: Part I

    May 15, 2022

    Metaverse: ‘Train your robots in the virtual world’ (CXOTalk interview)

    May 15, 2022
  • Network

    Qualcomm and AMD collaborate to optimize FastConnect platform

    May 18, 2022

    U.N. and advocates raise concerns of abortion access for Ukrainian refugees in Poland

    May 17, 2022

    Ansible vs Puppet | Compare DevOps Tools

    May 17, 2022

    Why Build in Web3

    May 16, 2022

    Broadband Nutrition Labels and Deployment See Renewed Focus in Washington

    May 15, 2022
  • Security

    Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

    May 18, 2022

    Is a Social Credit System Coming for Us?

    May 18, 2022

    Venezuelan doctor accused of selling computer programs to steal data in the US

    May 17, 2022

    Food Truck Festival Giveaway Rules

    May 16, 2022

    Tricity grapples with a new epidemic: Cyber crime

    May 15, 2022
  • Hosting
    1. Sunset Host Co
    2. Radio Host Co
    Featured

    Announcing Reliable VPS Server Hosting Provider with Thailand Bangkok based IP – TheServerHost – IT Industry Today

    By Sunset Host CoMay 18, 20220
    Recent

    Announcing Reliable VPS Server Hosting Provider with Thailand Bangkok based IP – TheServerHost – IT Industry Today

    May 18, 2022

    Announcing Reliable Dedicated Server Hosting Provider with Australia, Sydney, Melbourne based IP – TheServerHost – IT Industry Today

    May 17, 2022

    Announcing Reliable Dedicated Server Hosting Provider with USA, US, New York, California, Texas based IP – TheServerHost – IT Industry Today

    May 16, 2022
  • Media
    1. WSCA News
    2. Sunset Crypto
    3. Sustainable Action Now
    4. Life.Style Magazine
    5. Sunset Daily
    6. Sunset Music News
    7. Pro Merch Sports News
    8. Explore New Jersey
    9. Explore NJ News
    10. The Zine Weekly
    Featured
    Recent

    Mrs Hinch fans are sharing simple hack to get rid of flies during the heatwave – and it costs just 10p

    May 18, 2022

    Cloudways Review 2022: Features, Pricing & More

    May 18, 2022

    Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

    May 18, 2022
The Zine Weekly
You are at:Home » Security teams need a more defined strategy to combat ransomware – the modern form of digital extortion
Security

Security teams need a more defined strategy to combat ransomware – the modern form of digital extortion

Sunset Host CoBy Sunset Host CoMarch 5, 2022No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email
High-profile ransomware cases like the attack on Colonial Pipeline last year have got the industry’s attention. Today’s columnist, Shaun Bertrand of CBI, offers four tips on how security teams can mitigate ransomware. (Michael M. Santiago/Getty Images)

When discussing ransomware – which, for good reason has emerged as Topic A in cybersecurity – we should take a closer look at what happens during a typical incident. A ransomware attack starts when an adversary enters an organization’s cyber ecosystem, encrypts systems and data, and demands payment for decryption.

If the organization balks at paying, the adversary threatens to leak sensitive data and materials. If the organization still refuses payment, the adversary may launch a denial-of-service (DoS) attack to bring down critical systems. In some cases, attackers may threaten to modify important files, such as payroll documents or files containing essential source code.

All of which means we should call ransomware what it is: extortion. While the term “ransomware” implies that it’s all about weaponized technology, what we’re really dealing with is the criminal, malicious intention behind the weaponized technology.

To get a better sense of the frequency and impact of ransomware, CBI and Ponemon Institute recently released a research report, for which 659 IT security professionals were surveyed. Following are some of the more revealing findings:

  • Eighty percent of companies surveyed have experienced a ransomware attack within the past year – up from 51 percent in 2017 – despite spending an average of $6 million annually to prevent, detect, contain, and resolve ransomware. For staffing alone, organizations budget an average of $170,000 to pay for 14 employees to spend 190 hours containing and remediating the latest incident.
  • Of the 80% of companies that were compromised, 53 percent paid the ransom, which now averages more than $1 million. However, only half of these companies report receiving a decryption key from the attackers after paying. This means ransomware does not function as a business transaction. It’s extortion – expensive extortion at that.
  • Legal and regulatory actions account for the highest total costs resulting from a ransomware attack, more than productivity disruptions, technical support, reputation/brand damage and lost revenues.
  • Only 32% of organizations are confident in their security controls. Yet just 51% regularly conduct assessments to test their ransomware prevention and recovery practices, and just over one-third evaluate their third parties’ security and privacy practices.
  • Just 30% are confident in their employees’ ability to detect social engineering lures that could trigger a ransomware incident, even though 61% provide continuous security awareness training for staffers.

Clearly, organizations must take a proactive stance in responding to these developments. Relying on cyber insurance won’t solve the problem – two out of five companies are seeing decreases in ransomware coverage while still paying more than $17,000 annually in average premiums. Companies should also implement these industry best practices into their ransomware prevention strategies:

  • Understand the anatomy of common attacks.

As defenders, we know the general approaches – the tactics, techniques and procedures (TTPs) – of these criminals. They usually gain entry via phishing or insecure web applications. Once inside the network, attackers move laterally using relatively common techniques in search of valuable targets, all the while escalating privileges to increase their capacity to harm. With an understanding of the established, proven anatomies of the adversaries’ TTPs, companies can better align their detection, alerting and prevention tools, and procedures.

  • Develop a comprehensive ransomware playbook.

In addition to anatomy-based tools and procedures, organizations need a ransomware playbook that addresses how the organization will respond to everything from data leakage and DoS attacks to compromised systems integrity. A playbook should include legal and compliance considerations, as well as policies and procedures for third-party security assessments and employee training.

  • Acquire total visibility of potentially targeted assets.

While backing up data makes sense and a recommended practice, it’s no longer enough as a mitigation strategy: backups won’t stop hackers from leaking sensitive files or going after critical business dependencies, such as microservices and Software-as-a-Service (SaaS) integrations. Given this reality, security teams should strive to gain comprehensive visibility over all digital assets that are likely targets, putting them in a much better position to protect those assets.

  • Reach out for support when needed.

Once compromised, companies often make the mistake of immediately deciding whether to pay the ransom or not, without considering the possible consequences of each path. Most are inexperienced in ransomware negotiations, where saying the wrong thing can result in attackers increasing the ransom demand. What’s more, a sense of panic can result in bad decisions. Bringing in third-party experts who specialize in ransomware incident response will ensure incidents are dealt with in a measured, strategic way. Seven of 10 companies are hiring third-party experts to remediate ransomware incidents, up from 59% in 2017.

Ransomware has become a modern form of extortion, an offense as old as humanity. Today, cybercriminals use ransomware to forcefully extract huge payouts from organizations. But companies don’t have to be defenseless. Armed with the right knowledge, preparation, tooling and third-party expertise, companies can get ahead of adversaries before they strike – to minimize if not eliminate their capacity for damage.

Shaun Bertrand, chief services officer, CBI

Share this:

  • Twitter
  • Facebook

Related

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe difference between a technology vendor and a partner? Trust.
Next Article Russia Invades Ukraine: Latest Updates as News Organizations Stop Reporting in Russia
Sunset Host Co
  • Website
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • Tumblr
  • LinkedIn

Related Posts

Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

May 18, 2022

Is a Social Credit System Coming for Us?

May 18, 2022

Venezuelan doctor accused of selling computer programs to steal data in the US

May 17, 2022

Leave A Reply Cancel Reply

Categories
  • Anonymous (99)
  • Cloud (153)
  • Data Center (136)
  • Gadgets (176)
  • Green Tech (40)
  • Hosting solutions (98)
  • IT News (100)
  • Network (145)
  • Security (138)
  • Tech (97)
  • Web hosting (58)
  • Zine
  • Anonymous
  • Green
  • IT
  • Gadgets
  • Tech
  • Cloud
  • Data
  • Network
  • Security
  • Hosting
    • Sunset Host Co
    • Radio Host Co
  • Media
    • WSCA News
    • Sunset Crypto
    • Sustainable Action Now
    • Life.Style Magazine
    • Sunset Daily
    • Sunset Music News
    • Pro Merch Sports News
    • Explore New Jersey
    • Explore NJ News
    • The Zine Weekly

Subscribe to Updates

Get the latest tech news from the Zine at the Sunset Host Co. and the Radio Host Co.

Mrs Hinch fans are sharing simple hack to get rid of flies during the heatwave – and it costs just 10p

May 18, 2022

Cloudways Review 2022: Features, Pricing & More

May 18, 2022

Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

May 18, 2022

Qualcomm and AMD collaborate to optimize FastConnect platform

May 18, 2022

Aqua Security creates first unified scanner for cloud native security

May 18, 2022

Elon University / Today at Elon / #ElonGrad 2022 spotlight: Grace Holmes, exercise science

May 18, 2022

Announcing Reliable VPS Server Hosting Provider with Thailand Bangkok based IP – TheServerHost – IT Industry Today

May 18, 2022

Vi Data Delight Offer With Monthly Extra Data Launched for Hero Unlimited Prepaid Plans: Details

May 18, 2022
Copyright © 2022. The Zine Weekly, an SCA Entertainment & Media Company. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.