Ransomware

Ransomware is virus-like software which encrypts files, making computers and servers unusable, then copies data back to the hackers’ location.  The hacker then makes a ransom demand, with threats to expose confidential information to your clients and other interested parties.

It is pervasive and has afflicted organisations as large as the NHS and tens of thousands of small businesses.  The consequences can be life changing.

Best Practices

Software Updates

Regularly update software with the latest security patches. Don’t be low lying fruit to a hacker. If there is a known exploit for your operating system or software, hackers will look for it. Make sure you put this rudimentary obstacle in their way.

Clicking Links

Phishing emails are increasingly targeted and deceptive. There is good malware protection which will check every link in an email before allowing the user to land on a hackers’ site. The delay takes a fraction of a second and does not inconvenience the user. Make sure your email defences check these links.

Backup

All data (including emails and SharePoint) must be backed up, stored offsite and beyond the reach of a hacker. You also need to test your backup. Too often, people discover data which was outside of the backup scope, or that the restore process takes days when the business needs to be operational in minutes.

Email Security

Use strong anti-phishing and email filtering tools. Email remains the most common method hackers use to attack an organisation. Stopping them takes a multi-layered approach, with Email Security playing a prominent role.

User Training and Testing

If staff are not told what to look out for, how will they know when dangers present? Have a regular Cybersecurity training regime, followed up by discrete testing. Measure performance too, and work to make sure metrics improve over time.

Penetration Testing and Network Scanning

All defences need to be tested. Penetration Testing twice a year can be enough to check you are on the right path. A Vulnerability Scan inside your network will uncover devices that do not have the latest security patch. This single aspect will stop the majority of network hackers.

These are some topline areas to review to assist in the fight against today’s most pernicious cyber threat.