{"id":168,"date":"2020-08-20T00:01:49","date_gmt":"2020-08-19T21:01:49","guid":{"rendered":"https:\/\/fierceonlinevideo.com\/?p=168"},"modified":"2020-08-29T22:44:55","modified_gmt":"2020-08-29T19:44:55","slug":"you-have-found-ransomware-what-now","status":"publish","type":"post","link":"https:\/\/fierceonlinevideo.com\/security\/you-have-found-ransomware-what-now\/","title":{"rendered":"You have found Ransomware, what now?"},"content":{"rendered":"
\n

Does your company have a response plan in the event of a cyber attack? If the answer is no, the consequences can be catastrophic. Now more than ever, it is critical to map protocols so that everyone in the organization knows exactly what their role is in the attack. <\/span><\/p>\n

After <\/span>Want to cry<\/span> and other emerging ransomware attacks, these threats are only more destructive over time as hackers improve their strategies. In addition, it is important to consider the impact that such attacks can have on businesses. <\/span><\/p>\n

A <\/span>Malwarebytes 2017 Report<\/span> showed that 22% of small and medium-sized businesses attacked by ransom programs had to close down, while 15% lost revenue. These consequences can be devastating for almost any business, but their effects are particularly clear in the case of small and medium-sized businesses.<\/span><\/p>\n

The possibility of such damage must definitely be prepared for such attacks. Here are a few strategies that can be used if you or your company has an accident to fall victim to a ransomware attack. <\/span><\/p>\n

You have an original response plan<\/b><\/h2>\n

\"The<\/p>\n

When an event occurs, the time it takes to react is critical. The longer a company takes the answer, the greater the risk of losses. That is why it is important to create <\/span>ransom control plan<\/span>. <\/span><\/p>\n

The planning should include criteria for determining when ransom will be paid – if at all – for opening up information you hold hostage to hackers. After all, the decision to pay or not is a business decision and must be taken into account from all sectors of the company. The decision should be discussed and agreed upon together.<\/span><\/p>\n

The IT and security forces are not used to dealing with such situations, so it is essential that all relevant groups and members are prepared for such cases. Your team should know which problem is being discussed, which media segment the news is being directed to, and how customers will be notified of the attack. <\/span><\/p>\n

The idea is to choose which people are part of this group, and set a preliminary direction so they don\u2019t have to wait for you to start the first steps.<\/span><\/p>\n

Keep a backup of your response plan<\/b><\/h2>\n

\"contingency<\/p>\n

Backup is very important. Imagine your business was attacked and a certain computer was compromised. If the response plan was only stored in that system, how do you have access to it?<\/span><\/p>\n

Ransomware<\/span> able to lock computers and sometimes even the network on which they live. With this in mind, make sure the plan is stored in a safe place and can be accessed from multiple places.<\/span><\/p>\n

Set up a response team today<\/b><\/h2>\n

Do you already know who needs to be on the forum after a ransomware attack? Now is the time to decide. Managers and C-levels are important, but also ensure that PR professionals, human resources, and other department heads are present.<\/span><\/p>\n

Once you have formed your team, let them know and make a personal contact for emergencies. Make sure all members of this team know each other with their contact information for instant communication when needed.<\/span><\/p>\n

Have a communication plan<\/b><\/h2>\n

Attacks like this can also compromise a company\u2019s usual forms of business communications, so it\u2019s important that you have an alternative platform for secure communications with your team. Then make sure with a cell phone or other devices that everyone has access and that they can talk to each other in an emergency.<\/span><\/p>\n

Transfer responsibilities<\/b><\/h2>\n

After the attack at all levels of the company, from the technical department to public relations, a number of issues arise, all of which need to be resolved very professionally. Therefore, you may not be able to take care of everything yourself. Choose a reliable and capable professional who is able to manage this time of crisis while being able to delegate tasks. <\/span><\/p>\n

Decide how to react to the attack<\/b><\/h2>\n

Paying a ransom may be the easiest way to access compromised information, but it does not guarantee that cybercriminals will live up to their word. There is always a danger that paying redemption will only encourage criminals and allow them to develop even more sophisticated attacks on other companies in the future.<\/span><\/p>\n

Even if you are considering hacking payment for access to your files again, it is important that you have a solid plan B in case things go wrong. In some cases, it is assumed that even after the payment is made, the hacker will not have access to the files because the ransomware will damage the data and make it available. It is also important to note <\/span>The FBI does not recommend<\/span> pay the attackers.<\/span><\/p>\n

One of the first tasks a <\/span>ransomware attack<\/span> is to isolate all vulnerable systems, which prevents the infection from spreading to other machines, as most ransomware has the ability to replicate online.<\/span><\/p>\n

Consider upgrading your infrastructure<\/b><\/h2>\n

Upgrading an infrastructure can be an important way for a company to protect itself if it is not already in place. For example, cloud-based systems are easily and automatically updated in one place, collect real-time attack and intrusion information, and include internal restrictions that separate software layers and prevent intrusive software from attacking.<\/span><\/p>\n

This is an advantage over systems that rely on computers on company premises.<\/span><\/p>\n

It can also be relatively difficult for intruders to exploit the holes in cloud-based architecture. For example, at the end of April 2017 <\/span>Google blocked the phishing attack <\/span>(an attempt to email people to trick people into sending compromise information). Their success was largely due to the cloud-based features of Gmail software, which allow malware to be quickly identified and isolated by intruders.<\/span><\/p>\n

Take lessons and use them in the future<\/b><\/h2>\n

As more and more ransomware attacks become public, learn from the mistakes of others and investigate these events to prevent them from happening to you. Keep your response plans up to date as threats evolve so that you don\u2019t get caught. The threat landscape is constantly changing, but because of that, you don\u2019t have to be a victim.<\/span><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

Does your company have a response plan in the event of a cyber attack? If the answer is no, the consequences can be catastrophic. Now more than ever, it is critical to map protocols so that everyone in the organization knows exactly what their role is in the attack. After Want to cry and other […]<\/p>\n","protected":false},"author":2,"featured_media":169,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":6,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/posts\/168"}],"collection":[{"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/comments?post=168"}],"version-history":[{"count":0,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/posts\/168\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/media\/169"}],"wp:attachment":[{"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/media?parent=168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/categories?post=168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/tags?post=168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}