OX IT Solutions Ltd

01865 594 930

One of our representatives will be happy to help. Call us at

Ransomware Protection

Over the last few years, a number of ransomware attacks, including Wannacry and Not-Petya have been unleashed to cause widespread disruption on a scale previously unseen. Infecting more than 500,000 computers in 150 countries bitcoin ransom payments have been demanded in 28 languages. Because of its success in compromising and encrypting systems, the attack is already inspiring imitators, meaning we're all at risk of further disruption and downtime.


Thousands of new malware variants are being reported each year and cyber criminals are becoming more sophisticated each day.


Here are 6 strategies that will lower your risk profile and help you defend your company's data and business.


Want to know more...

If you would like any further information on the products we offer, please get in touch.

CONTACT US PRODUCTS

TOP 6 DEFENSE STRATEGIES


01

NEXT GENERATION ANTI-MALWARE PROTECTION


The best way to steer clear of viruses and malware is to use an industry-leading anti-virus software solution. There are many types out there, and they don’t have to break the bank, but having a superior level of defense will go a long way. Ensure you are running the latest additional ransomware prevention components for your preferred security solution such as behavioural analysis and zero day detection modules. Also, on your anti-virus software, enable the auto update, auto-protect, and personal firewall features to ensure you always have protection in the background that is continually updated.

02

MONITOR YOUR NETWORK


Diligently monitor your network by analysing your logs, clearing out alerts, and processing potential threat feeds. If the infection is detected quickly and the workstation is disabled immediately, you can recover the data within 24 hours, and often in as quickly as five minutes. Organisations should constantly update the operating system and other software on their systems with the latest patches. Unpatched vulnerabilities in operating systems and software are a common entry point for malware.

03

LOCK DOWN SUSPICIOUS EMAIL ATTACHMENTS


Organisations may also want to install advanced email spam filtering which will block email messages with attachments from suspicious sources. Admins can filter executable attachments in emails based on the file extensions (e.g., block emails sent with “.EXE” attachments). Admins should also disable macros embedded within attachments and re-enable the display to full file extensions which makes it way easier to spot suspicious files.

04

TRAIN YOUR USERS & TEST THEIR KNOWLEDGE


Since ransomware infections often come through links and attachments inside emails, or from a website or web application, train your users how to recognises phishing attacks and suspicious links and attachments. Training is only part of the story. Admins must also make sure to regularly test their users with simulated phishing attacks to ensure that your users have been properly conditioned to resist these attacks.

05

MAINTAIN DEVICE & DATA SECURITY FOR MOBILE USERS


To support BYOD and reduce the risk to your business it is crucial to put a policy in place that ensures the security of all corporate/employee owned devices. In doing so it will allow you to keep an inventory of all devices and applications, enforce configurations and limit the number of features that can be installed whilst monitoring/controlling user and device access to internal systems all of which provide device and data security for both the employee and employer.

06

HAVE AN INCIDENT RESPONSE PLAN


How you’ve prepared will determine how quickly you are able to restore your company’s data and get systems functioning again. This starts with a well-designed plan that is understood by the entire team. Practice executing the plan to ensure you are able to get systems back online in the expected time-frame. The practice will also give your team the confidence to perform flawlessly when the need arises.

Do you know about our Remote Cyber Security Review?


Is your security solution performing as it should be?

Our Security Review has been created to protect our customers starting with a review of your existing security implementation to discover gaps in your protection, reduce operational costs, enforce compliancy, employ best practices and advise on your upgrade requirements.