Ten Best Practices To Secure Against Ransomware
Ransomware hits without discrimination or notice, penetrating through the web, email or removable media devices. It can bypass even the most advanced protection. The impact can be devastating, crippling businesses for days after.
With the rising threat of ransomware, I outlined ten steps that enterprises should take to reduce the risk of affected by it.
- Develop a backup and recovery plan – It’s necessary to have regular backups to
counter ransomware, with the backup stored offline on separate devices. Fortinet also
advises that the backup process should be “practical and diversified”.
- Use professional email and web security tools – There are tools available that can analyze email attachments, websites, and files for malware, as well as block any ads or social media that may have been compromised and have no relevance to one’s business/company. It is recommended that any tool used should have sandbox functionality, which will ensure that unrecognized files can be scanned and analyzed safely.
- Keep your operating systems, devices, and software updated – Making sure your
system and devices are always up to date will greatly reduce the number of exploitable
- Ensure your device and network’s security measures are updated – Similar to the
above. Keeping your antivirus, IPS, and anti-malware updated will mean better protection against the latest threats
Use application whitelisting – This will keep out unauthorized applications from
being downloaded or executed.
Segment your network into security zones – By doing this, infections can be isolated
and will not easily spread.
- Establish and enforce permission and privilege – The less who have access to
critical applications, data or services, the more secure the network. Fortinet also
recommends using strong passwords and changing them often
Establish and enforce a BYOD (Bring Your Own Device) security policy – Create an effective policy that enforces inspection, making sure to deny devices the access to
company network, so long as they do not meet security standards
Deploy forensic analysis tools – This is to help determine where infections come from,
the duration it stays within your network, whether you have successfully purged it on
all devices, and to help secure your network from it in the future
Do NOT rely on employees to keep you safe (CRITICAL) – Individual employees are the biggest security risk in organizations, so rather than rely on them being careful it is
more important to have back up plans in the case of a security breach