How to avoid being a victim of ransomware

by time news

2023-10-05 10:19:53

The first half of 2023 has established a new increase in the number of cyber attacks worldwide, reframing ransomware as the main cybersecurity problem, which already reaches 24% of all security breaches according to the report DBIR 2023.

As shown in Mid-YearReport 2023 From Check Point Research, during this semester 48 ransomware groups have been identified as responsible for the violation and public extortion of more than 2,200 companies around the world.

Furthermore, this study shows that, although the Government, Healthcare and Education/Research sectors are among the most attacked, with much more marked disruptive costs, the main target of ransomware is mainly focused on the manufacturing, retail and manufacturing sectors. and software services.

The postman always calls twice, and the ransomware up to three

In double extortion ransomware attacks, if the ransom is not paid, malicious actors sell the stolen data or post it on public forums. In fact, increasingly, cybercriminals are turning to triple extortion, where they blackmail individual employees or victims into paying for their data. According to the estimates of Cybersecurity Venturesthis model of cyber attacks will accumulate damage costs of around $265 billion by 2031.

To achieve effective ransomware prevention, companies must take a proactive approach with good security practices focused on on-premises networks, cloud infrastructures, and hybrid work environments, from the grassroots to the board of directors.

Top actions to take to minimize the exposure and potential impacts of a ransomware attack

Robust data backups: The goal of these cyberattacks is to force victims to pay a ransom to regain access to their encrypted data. However, this is only effective if the target actually loses access to your data. Making regular backups is a safe and effective way to mitigate the impact.

Digital awareness training: Phishing is one of the most popular ways ransomware spreads. Through these deceptions, cybercriminals gain access to the computers on which this malware will be installed. Cybersecurity education is crucial to protecting any company against these and other cyber attacks, using its own staff as the first line of defense to ensure a protected environment.

Updates and patches: Keeping computers up to date with the latest versions and security patches, especially those labeled as critical, helps greatly limit vulnerabilities and entry points for cyber attacks.

Strengthening user authentication: Implementing a strong password policy or using a multi-factor authentication system are critical components to any cybersecurity strategy.

Intelligent threat prevention: Automated threat detection and prevention can maximize protection possibilities. AI-powered cybersecurity solutions have become an indispensable ally as cybercriminals refine their tactics.

Anti-ransomware solutions: Dedicated entirely to defending against these cyberattacks, these tools monitor running programs for suspicious behavior commonly exhibited by ransomware. Additionally, in the event of a detection, the program can take necessary steps to stop the encryption before further damage is done.

It is important to maintain a proactive approach when defending against these types of attacks. And because criminals use practices such as double or triple extortion, targeting all parties involved in these breaches, there is no real guarantee that they will recover or prevent the leak of the compromised data once the ransom is paid.

In fact, these payments help finance the efforts of cybercriminals, also establishing a precedent for other groups or individuals to try to take advantage of this willingness to pay.

Although ransomware attacks are a present fear for many companies, in many cases it is possible to reduce and even prevent their impact,” explains Eusebio Nieva, technical director of Check Point Software. “It is essential to have adequate tools that include scanning and monitoring email and file activity for suspicious behavior”.

More information

#avoid #victim #ransomware

You may also like

Leave a Comment