How to prepare for a ransomware attack

The threat of ransomware

Ransomware has become a common and well-known threat to organizations. Its success is largely based on the fact that it is a simple yet effective way for an attacker to make money from a target organization. By denying people access to their (valuable) data, an attacker can demand an average of $12,762 per attack.

While almost 40% of ransomware victims pay the ransom, this doesn’t always solve their problems. 4% of the time, a ransomware victim does not receive the decryption tool even after paying; on average, only 93% of data is recovered from a ransomware attack.

DevOps Connect:DevSecOps @ RSAC 2022

The most cost-effective means of dealing with ransomware attacks is to never to be the victim of one in the first place. By preparing for a ransomware attack, an organization can limit the probability of being a victim of ransomware and soften its expected impact.

Preparing for a ransomware attack

Ransomware attacks are only becoming more common. In the first quarter of 2019, ransomware attacks grew by 118%. With an average cost of $55,000 per attack, it’s far more economical for organizations to take the necessary steps to minimize their exposure than to pay the cost of an attack. 

By taking a few simple actions, an organization can dramatically decrease the probable impact of a ransomware attack.

Employee education

92% of malware is delivered by email, and this is the most common delivery mechanism for ransomware as well. By tricking a user into clicking on a malicious link or opening an Office document that acts as a downloader, an attacker can infect a computer with ransomware. The threat of phishing emails makes employee education a priority. 

The sheer number of phishing emails sent every day and the wide variety of attack techniques mean that some emails will (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Howard Poston. Read the original post at: