In today’s ruthless and competitive environment, cybersecurity needs to be foolproof, as it only takes a single breach to in ict serious damage to your data and business. But in case of a security breach, we must be able to recover our systems without paying ransom, which ultimately trans- lates into funding cybercriminals, thus making them bolder and highly sophisticated. Below are a number of useful measures that can help mitigate the risk of the ransomware threat:
• Keep up-to- date: Ransomware is a constantly evolving threat. It is important to keep up-to- date with new developments with awareness trainings.
• Impose and enforce strict employee practices:
• Avoid visiting malicious or compromised websites.
• Keep track of browser extensions and plug-ins.
• Don’t click spontaneously on links embedded in emails.
• Delete spam permanently from your mailbox.
• Beware of phishing sites and traps. If you are not, you may instantly expose your client to security threats.
• Don’t install any unauthorized software.
• Update software vulnerabilities and patches
• Ensure that software and operating systems in your organization are up-to- date with security patches.
• Secure mobile devices: Equip all mobile devices with security solutions and a remote-wipe program. Back up their data routinely. If ransomware locks a mobile device, the remote-wipe program should reset it to an agreed recovery point.
• Employ multilayered defense: Use multilayered secu- rity solutions like end-point, messaging and network protection.
• Onsite and offsite backup: Store, maintain and back up data and configurations regularly.
• Control system encryption: Two senior managers working in tandem should encrypt the whole system. They should also copy the decryption key to a designated, safe, unobtrusive location.
Ransomware is a thriving menace. With growing revenue, ransomware groups can continue to advance their techniques. Security practitioners need to recover their systems without paying ransom. There is no bulletproof solution, but we can certainly cut the veins of ransomware groups and bleed them to death.