loader image

Fortinet: 15 Ways To Protect Your Organization From Ransomware

Fortiguard Labs reported at least two significant ransomware families the last quarter.

Ransomware’s New Game is a Killer

The GandCrab ransomware reportedly earned more than $2 billion for its developers in less than two years. Much of the money was the result of their use of RaaS to distribute their malware. By establishing a network of affiliate partners, GandCrab’s authors were ready to spread their ransomware widely and scale earnings dramatically by taking a slice of each attack.

With the addition of two additional prevalent ransomware variants to the RaaS sales model, ransomware not only continues to be a transparent and present danger to enterprise organizations, but organizations can expect a big uptick within the volume and severity of attacks for the approaching year. By using the RaaS model, the authors of malware like Sodinokibi and Nemty are significantly lowering the bar for launching attacks, making ransomware even more accessible and profitable for a growing pool of bad actors.

15 Things to Implement

Organizations need to take steps now to guard their networks and networked resources from the growing problem of sophisticated ransomware. Here are 15 stuff you can start to implement today.

  1. Patch and update your operating systems, devices and software.
  2. Use inventory tools and IOC lists to prioritize which assets are at the foremost risk.
  3. Update your network IPS signatures and your device antivirus and anti-malware tools.
  4. Back up your systems and store backups offline, alongside any devices needed for network recovery.
  5. Run recovery drills and pre-assign responsibilities so systems are often restored quickly within the event of a successful breach.
  6. Update your email and web security gateways to see email attachments, websites, and files for malware.
  7. Use a sandbox to execute and analyze new or unrecognized files during a safe environment.
  8. Block advertisements and social media sites that haven’t any business relevance.
  9. Use zero-trust network access that has virus assessments so users can’t infect business-critical applications, data, or services.
  10. Inspect and block bring-your-own-devices that don’t meet the safety policy.
  11. Use application whitelisting to stop unauthorized applications from being downloaded or run.
  12. Prevent unauthorized SaaS applications with a CASB solution.
  13. Segment your network into security zones to stop the spread of infection.
  14. Use forensic analysis tools to spot where and infection came from, how long it’s been in your environment, make sure you have removed all of it from every device, and ensure it doesn’t come.
  15. Plan around the weakest link in your security system – the people that use your devices and applications. Training is important but limited. Proper tools, like secure email gateways, for instance, can eliminate most if not all phishing emails and malicious attachments.

Protection Requires Preparation

As cybercriminals expand the RaaS market with new ransomware variants to expand their earning potential, enterprises need to significantly intensify their efforts to guard themselves. Bad actors are focusing their attacks to realize maximum impact and profitability, often combining highly targeted attacks with increasingly stealthy and unexpected methods. Organizations that prepare now stand the best chance of withstanding this latest wave of malicious criminal activity.

Download Free Fortinet Resource

Get access to authentic content from one of the leading security experts in the world from the Philippines’ premier technology provider.

Articles you might like

Ruckus Analytics Provides Advantageous AI for Your Business

Ruckus Analytics Provides Advantageous AI for Your Business

Network analytics and service assurance are the key goals of the cloud service, Ruckus Analytics from CommScope. It is powered by machine learning (ML) and artificial intelligence (AI). Because of these two, Ruckus Analytics enables clients to utilize their network to...

read more
Sonicwall Capture Advanced Threat Protection

Sonicwall Capture Advanced Threat Protection

The Advanced Protection You Need, Where You Need ItFor effective zero-day threat protection, organizations need solutions that include malware-analysis technologies and can detect evasive advanced threats and malware — today and tomorrow. Capture Advanced Threat...

read more
Cato MDR

Cato MDR

Managed Threat Detection and ResponseCato Managed Detection and Response (MDR) is an advanced security service that offers continuous threat detection and guidance on how to respond to malicious events, quickly, and effectively. Cato MDR leverages AI and ML, combined...

read more
Share This