During a ransomware attack, cyber criminals will hold business’ IT systems hostage until demands for money are met–and only after the ransom fees are paid in full is valuable business data returned to the rightful owner. Upon infection, ransomware begins its attack by encrypting valuable files and folders on local storage and backup locations, as well as local hard drives—and any other data points on the same network that the infected device is attached to. Problematically, the infection will usually go unnoticed until someone attempts to use the system and access is either denied or met with on-screen messaging threats of ransom and data destruction.
Businesses should educate employees as to how ransomware and other malware can compromise valuable business and personal data. Be sure to reinforce the importance of avoiding spammy websites and emails, suspicious links, and unfamiliar downloads or attachments.
Develop a Disaster Response Plan
A business should have a business continuity and disaster plan in place from the moment they open their doors and their network. A well-designed and properly executed disaster plan can cut back on any downtime and loss of profits that result from the attack and also protect valuable sensitive business data from further corruption. If your business is required by law to comply with certain security measures to keep financial or personal consumer information secure, having a disaster plan is an absolute necessity in order to mitigate your exposure to financial risk and liability in the event of a data compromise.
Maintain Patches and Updates
Maintain operating system patches and software and firmware updates, keep anti-virus and anti-malware solutions updated automatically and perform regular audits of your IT system.
Limit Administrative Accounts
Limit administrative users and privileged accounts to a necessary group of business managers, and only use these accounts when absolutely required.
Configure Permissions Correctly
Ensure all network sharing permissions, access controls, and file directories are configured correctly. Implement read-only rather than write-access for those employees who don’t need full access or authority within the system.
Disable Macro Scripts
Office files transmitted over email should have macro scripts disabled.
Restrict Vulnerable Software
Put software restriction policies in place to prevent programs from launching from typical ransomware locations, like temporary folders and compression files.
Business Continuity Best Practices
Conduct regular backups and verify their integrity on a regular basis, and make sure all backups are secured and not related or connected to the networks and computers that they are supporting.
CSP, Inc is the trusted choice when it comes to keeping your business’ network safe from ransomware and other malware attacks. We pride ourselves in always staying ahead of the latest information technology tips, tricks, and news. Contact us at (919) 424--2000 or send us an email at firstname.lastname@example.org for more information.