All Content8 Ways to protect Your Network against Ransomware
8 Ways to protect Your Network against Ransomware
3. Back up your files regularly
Another safeguard against having to pay ransom is a robust backup and
recovery strategy. Depending on how quickly the compromise is detected,
how widely it has spread and the level of data loss that is acceptable, recovery
from a backup could be a good option. However, this calls for a smarter
backup strategy that is aligned to the criticality of your data and the needs
of your business around recovery point objectives (RPO) and recovery time
objectives (RTO).
4. Make sure your endpoints are protected
Since most users primarily interact with personal and corporate devices,
the endpoints are particularly at risk if they are not managed or don’t have
the right anti-malware protection. Most anti-virus solutions are signaturebased and prove ineffective if not updated regularly. The newer ransomware
variants are uniquely hashed and thereby undetectable using signature-based
techniques. Many users also turn off their virus scans so that it doesn’t slow
their system down.
Implement a layered security strategy
for greater network protection.
3
5. Patch your systems and applications
Many attacks are based on known vulnerabilities in browsers including
Internet Explorer, as well as in common apps and plug-ins. Therefore it’s
critical to apply updates and patches promptly and reliably. Choosing
a solution that is able to automate patching and version upgrades in a
heterogeneous device, OS and application environment will go a long way in
addressing a range of cyber threats, including ransomware.
6. Segment your network to stop the spread
Most ransomware will try to spread from the endpoint to the server/storage
where all the data and mission critical applications reside. Segmenting the
network and keeping critical apps and devices isolated on a separate network
or virtual LAN can limit the spread.
Segment your wireless LAN to separate
internal from guest users for an
additional level of security.
7. Quarantine and analyze suspicious files
Technologies such as sandboxing provide the ability to move suspicious files
to quarantine for analysis before they can enter the network. The files are
held at the gateway until a verdict is returned. If a file is found to be malicious
you can prevent follow-on attacks by implementing protective measures
such as policies that block associated IP addresses or domains, or deploying
signatures to security appliances across the network.
4
Please complete the form to gain access to this content