8 Ways to protect Your Network against Ransomware

3. Back up your files regularly Another safeguard against having to pay ransom is a robust backup and recovery strategy. Depending on how quickly the compromise is detected, how widely it has spread and the level of data loss that is acceptable, recovery from a backup could be a good option. However, this calls for a smarter backup strategy that is aligned to the criticality of your data and the needs of your business around recovery point objectives (RPO) and recovery time objectives (RTO). 4. Make sure your endpoints are protected Since most users primarily interact with personal and corporate devices, the endpoints are particularly at risk if they are not managed or don’t have the right anti-malware protection. Most anti-virus solutions are signaturebased and prove ineffective if not updated regularly. The newer ransomware variants are uniquely hashed and thereby undetectable using signature-based techniques. Many users also turn off their virus scans so that it doesn’t slow their system down. Implement a layered security strategy for greater network protection. 3 5. Patch your systems and applications Many attacks are based on known vulnerabilities in browsers including Internet Explorer, as well as in common apps and plug-ins. Therefore it’s critical to apply updates and patches promptly and reliably. Choosing a solution that is able to automate patching and version upgrades in a heterogeneous device, OS and application environment will go a long way in addressing a range of cyber threats, including ransomware. 6. Segment your network to stop the spread Most ransomware will try to spread from the endpoint to the server/storage where all the data and mission critical applications reside. Segmenting the network and keeping critical apps and devices isolated on a separate network or virtual LAN can limit the spread. Segment your wireless LAN to separate internal from guest users for an additional level of security. 7. Quarantine and analyze suspicious files Technologies such as sandboxing provide the ability to move suspicious files to quarantine for analysis before they can enter the network. The files are held at the gateway until a verdict is returned. If a file is found to be malicious you can prevent follow-on attacks by implementing protective measures such as policies that block associated IP addresses or domains, or deploying signatures to security appliances across the network. 4
Please complete the form to gain access to this content