Don't have an account? Sign up
Ransomware is a cybercrime where a hacker encrypts a victim's data with malicious software with the intent that the attacker must be paid before the system will be unlocked. Once the ransom is paid, the attacker should send a decryption key to restore access to the victim's data, but often the system is unlocked and the stolen data is held for as second ransom. The ransom can range from a few hundred dollars to millions of dollars. Typically, payment is demanded in the form of a cryptocurrency, such as bitcoins.
Ransomware is typically distributed through a few main avenues. These include email phishing, malvertising (malicious malvertising), social engineering, and exploit kits. After ransomware is distributed, it encrypts selected files and notifies the victim of the required payment.
Make sure you have an enterprise data backup solution that can scale and won't experience bottlenecks when the time comes. In the event of an attack, you can power down the endpoint, reimage it, and reinstall your current backup. You will have all your data and prevent the ransomware from spreading to other systems.
Make a habit of updating your software regularly. Patching commonly exploited third-party software will foil many attacks. If possible, turn on automatic patching.
The weakest link in the security chain is usually human. Educate your users about whom and what to trust. Teach them to not fall for phishing or other schemes.
Take a layered approach, with security infused from the endpoint to email to the DNS layer. Use technologies such as a next-generation firewall (NGFW) or an intrusion prevention system (IPS).
Limit the resources that an attacker can access. By dynamically controlling access to resources based on sensitivity, like confidential or critical data, you help ensure that your entire network is not compromised in a single attack.
The ability to see everything happening across your network and data center can help you uncover attacks that bypass the perimeter. Deploy a demilitarized zone (DMZ) subnetwork or add a layer of security to your local area network (LAN). Leverage your security platform to effectively bring all the information together to triage, analyze, and respond quickly.
Most ransomware infections occur through an email attachment or malicious download. Diligently block malicious websites, emails, and attachments through a layered security approach and a company-sanctioned file-sharing program.
Antivirus solutions on your endpoints don't suffice anymore. Set up privileges so they perform tasks such as granting the appropriate network access or user permissions to endpoints. Two-factor authentications will also help.
Know your enemy. Take advantage of threat intelligence from organizations such as Talos to understand the latest security information and become aware of emerging cybersecurity threats.
Incident response teams provide a full suite of proactive and emergency services to help you prepare for, respond to, and recover from a breach.
Cisco Talos threat hunters identify new and evolving ransomware threats. See how their research and intelligence helps organizations build strong defenses.
Read this ransomware defense guide to learn how to defend against attacks and reduce ransomware risks. In this book, you will
Organizations can now automatically recover from ransomware attacks with the industry's latest innovative capabilities in Cisco Extended Detection and Response (XDR).