With ransomware attacks on the rise in 2016, a lot of organizations are scared. According to the KnowBe4 2016 Ransomware Threat Concerns survey, many organizations don’t have faith in their backup systems, which compounds the fear of a Crypto-Locker style attack. The survey of over 1100 companies found that 38% of the companies asked had been hit with a ransomware attack in 2016, up from 20% in 2014. Ransomware attackers aren’t just limiting attacks to a single industry. They are hitting hospitals, banking institutions, the manufacturing industry and state and local governments.
What can you do to protect your organization and prevent ransomware attacks from occurring in the first place? Here are three things you can do today to shore up your defenses:
- Awareness and Training: Distribution of ransomware generally occurs in a series of steps according to Sophos. First, the ransomware is installed on a victim’s computer, through a phishing email or malicious file downloaded from the Internet. Next, once installed, it establishes communication with a server that is owned by the criminal group that initiated the ransomware. Once communication is established, a series of handshakes and keys are exchanged to identify client and server. One key is kept on the victim’s machine, while the other is stored on the server. Once the key is established, the ransomware begins the task of encrypting every file it finds. Then finally the ransomware app displays a screen demanding money for the key to decrypt the files. Payment is usually in the form of some sort of untraceable currency such as bitcoin or other electronic payment.
Armed with this knowledge, you can begin to develop and tailor your security awareness training to incorporate recognizing suspicious emails, and teach employees not to download software from untrusted websites. What’s that you say? You don’t have a security awareness program? Believe it or not, you are not alone. Many organizations include some type of computer security as part of an overall new hire training, but employees aren’t required to re-certify.
- Test your backup systems: As mentioned earlier, according to the survey, many companies do not trust their backup systems enough to feel confident recovering from a ransomware attack. The simplest thing to do is test your backups regularly. Develop a test plan and procedure, simulate a ransomware attack and see how everyone performs. Hold an after-action meeting, document the lessons learned and update your test plan. Then repeat. Sure, it’s easier said than done because we all have day jobs. But would you rather spend some extra money to support a backup test or give money away to cyber criminals to get your files back? Testing your backups can be worked into a quarterly cycle and the tests should be as realistic as possible on the hardware that your company uses. Not only should you focus on ransomware attacks, but other kinds of cyber security incidents and you can even work in a disaster recovery scenario.
- Assess your readiness: While 1 and 2 are important, you can take it one step further and test your readiness now. Assess your security team. Ask them questions about ransomware. “Do we have a cyber incident response plan? Does it incorporate all threat vectors including ransomware?” Those are just some good starters. To be really effective, a full information security assessment might be necessary to get the bigger picture of your organization’s security posture. While ransomware attacks are keeping many CIOs up at night, there are far worse things, like data theft due to a breach. That is much more damaging to your business’s reputation and has a significant financial impact.
Whatever keeps you up at night, let CyberSheath help you get started to shoring up your security. Click the link below to learn more about our information security assessment process. We would be happy to chat with you about awareness and training and other security programs as well.