Rançon rassurer

Just the thought of the word RANSOM may send “Techies” into a cold sweat… TO PAY OR NOT TO PAY!

According to recent studies, the actual “cost” of a ransom can be above $700,000 between the Bitcoin payment, fees, loss of business – downtime, loss of data or hardware, and the expense of improving the infrastructure. You don’t need to be a victim. It is a reality that in today’s technological society, it is not IF but WHEN your organization will see a ransom attack. However, there are 10 things you can do TODAY to create an anti-ransomware strategy.

  1. Map your attack surface. Identify all of your systems and devices you use to conduct business. CyberClan can provide you with an active inventory sheet for you.
  2. Patch and upgrade your vulnerable devices. Establish a routine to regularly patch and upgrade is just basic best practice.
  3. Update your security systems. Make sure all of your security solutions are up to date.
  4. Segment your network. Network segmentation ensures that compromised systems and malware are contained to a specific segment of the network.
  5. Secure your extended network. Ensure your security solutions are on the entire network.
  6. Isolate your recovery systems and backup your data. Store backups off-site and do it frequently.
  7. Run recovery drills. Practice makes perfect.
  8. Leverage outside experts. Can you say “CyberClan!!”
  9. Pay attention to ransom events. Stay alert to the latest trends in cybersecurity news.
  10. Educate your employees. The human link can be the strongest force in your security chain if education properly… Otherwise, this becomes your weakest link. Consider contacting CyberClan to help create your Cybersecurity Awareness Training Program.

Base de connaissances

Fin de vie pour Windows 7 et Windows Server 2008 R2

Microsoft Ending Support for Windows 7 and Windows Server 2008 R2 – January 2020 As we prepare for the holidays, businesses need to prepare for a huge change is support

Lire plus +

Revue Darknet – Mars 2020

February has been a relatively active month on the darknet, as previously persistent DDoS attacks have subsided. The dominant view is that these DDoS attacks were carried out by the

Lire plus +

Microsoft divulgue des informations sur une faille ‘wormable’ avant de publier le correctif

Microsoft accidentally leaked information about a security update for a vulnerability, tracked as CVE-2020-0796, which reportedly should have been disclosed as part of Patch Tuesday. This is a ‘wormable’ pre-auth

Lire plus +
icon-dark icon-light icon logo-light