ES Outlook Weekly Brief
Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from ES Outlook
Ransom ware triggers a trembling response in most business owners as it has the ability to encrypt all business related data disabling access to the organization hosting the enterprise. Ransom ware attacks are mostly carried out using a Trojan, entering a system through malicious email attachments, infected software applications, infected external storage devices or websites. Payment is demanded before the ransomed data is decrypted.
To safeguard data from ransom ware attacks users are urged to back up computing devices in regular intervals and update software including anti-virus software. As these attacks are nearly impossible to stop there are data protection measures which help individuals and organizations to safeguard their data.
A robust data recovery strategy is the prime thing to establish. This will help in minimizing the risk of ransom ware infection. The strategy should include patching and updating software on regular basis. It is good to provide an end user training to provide insight into the malicious practices.
Since email is one of the strongest weapons of attack, URL protection scans can be incorporated preventing the user from clicking on a link until determined virus-free. Attachment protection allows the user to view attachment in a safer format.
Refreshing the old back up strategy with multiple layers of data protection also contributes as a protective measure. If got infected, having an off-site back up in the cloud will mitigate the breach problem. Following 3-2-1 rule( three copies of data, in two different forms of media, with one copy as off-site back up) will assist in reducing the loss of critical data.
Installing an Intrusion Prevention System(IPS) will effectively protect business with greater accuracy.
Although ransom ware attacks are not life threatening it can damage the reputation of the business. The cost of an attack is far more than the cost of prevention. Then why not protect the business while it is possible to.
By Kim Tracy, CIO, Northeastern Illinois University
By William Miller, SVP & CIO, Broadcom, Inc.
By Dr. Cheryl Flink, Chief Strategy Officer, Market Force
By Paul Kent, VP-Big Data, SAS
By Tom Conophy, CIO, Staples Inc.
By Mark Lilien, SVP & CIO, Things Remembered
However, if you would like to share the information in this article, you may use the link below: