Ransomware attacks are becoming more and more prevalent, disrupting business operations and costing thousands of dollars in losses.
As a business, you can protect yourself from ransomware by understanding the threat and by having the right technologies, policies, people, and processes in place to counter this insidious attack.
Here are 10 best practices to consider for protecting your business from ransomware.
- Understand the Threat: Crypto ransomware works by encrypting certain, sensitive files types and then forcing the victim to pay a ransom to gain access to a decryption key for the data. With nearly all types of crypto ransomware it’s virtually impossible to recover data without paying for the decryption key. Sometimes even paying the ransom won’t decrypt the files. As a business, you and your IT department need to ensure your infrastructure is adequately secured, and be able to explain why it’s essential they have the technologies and policies in place for protection.
- Educate Users: It takes one bad decision by a user to unleash a costly ransomware attack. Ransomware is often delivered as a Trojan, through “malvertising”, or through a phishing email. Prevention isn’t possible 100% of the time, but in many cases attacks can still be stopped if users are educated about what to look for.
- Teach Users Not to Phish: The Webroot® 2016 Threat Brief showed that up to 50% of users will fall for a phishing attack in 2016. The key is to teach users to not open emails from unknown senders with attachments or links – and how to spot suspicious emails even when they look like they’re from known senders. Instruct users on spotting expressions or greetings the sender wouldn’t normally use as clues to something “phishy”. If all else fails, real-time anti-phishing protection can often block even zero-day phishing attacks.
- Maintain Layers of Anti-Ransomware Technology: Reliable, cloud-based antimalware can prevent nearly all ransomware attacks, but it’s important to remember that new delivery vectors are being released constantly, so no endpoint security solution alone will offer you 100% protection. Additional security layers like firewalls, Windows OS policy restrictions, and having proper back-ups in place will all help to secure your environment.
- Patching and Plug-Ins: Keeping applications like Adobe Reader, Java, and other plugins up to date greatly reduces security vulnerabilities and prevents browser and application vulnerabilities that may bypass your antimalware defences. Ad and pop-up blockers also greatly reduce user error, stopping users from inadvertently clicking fake dialogs that download ransomware.
- Use Windows Policies to Block VSS: Blocking access to Volume Shadow Copy Service will help stop ransomware like CryptoLocker from trying to erase file backups. By creating a blocking policy for the VSSAdmin executable, any attempt to access or stop the service will result in the action being blocked.
- Disable Windows Script Hosting: VBS scripts are used by malware authors either to cause disruption in an environment or to run a process that will download more advanced malware. You can disable them completely by disabling the Windows Script Host engine which is used by .VBS files to run. case of a ransomware attack, they might lose data on every mapped drive.
- Filter .EXE Files in Email Servers: If your customers’ email gateways have the ability to filter files by extension, you should consider denying emails sent with .EXE files, or denying emails sent with files that have two file extensions, the last one being an executable (“*.*.EXE” files). This is a common threat vector for crypto ransomware.
- Always Have a Back Up: Nothing is more effective at mitigating a crypto ransomware attack than being able to instantly restore data from business continuity backups. It cannot be overemphasized the importance of backups. Without a backup you might lose data on every mapped and even unmapped drive. Ransomware such as CryptoLocker can even encrypt networked drives. Having offline air gap or cloud back-ups with multiple copies of each file makes it virtually impossible for extortionists to infect backup data while offering benefits to clients.
- Stay Current on Ransomware: It pays to keep up with ransomware developments. Some ransomware strains have been cracked, but these are limited successes. Ransomware, like all malware, will continue to evolve. It is important to monitor this evolution: which strains are most dangerous and who is being targeted. The more informed you are, the better you can ensure protection are in place.
Some of the information in this blog has been provided by Webroot who provides Cybersecurity solutions. Their intelligent endpoint protection and threat intelligence services work to secure the Internet of Everything. By leveraging their cloud-based collective threat intelligence platform, computers, tablets, smartphones, and more are protected from malware and other cyberattacks.
Future Logic is partnered with Webroot as a trusted security solution provider, helping us to protect our customers.