SlideShare a Scribd company logo
Want more ransomware information? Go to ransomware.org >
Ransomware
Being Prepared Leads to Successful Recovery
Ransomware attacks are on the rise! Enterprise data has become a very lucrative target for
cybercriminals. Even with robust defense mechanisms in place, ransomware attacks continue to
increase. In the first half of 2020, there were approximately 2.5 million new ransomware attacks,
according to the November 2020 McAfee Labs Threat Report.
Encryption ransomware:
Encrypts files, folders, and shared
network storage.
Network-attached storage (NAS)
ransomware: Encrypts and/or
deletes files on home directories,
virtual machine (VM) hypervisor
backups, shadow volumes, and
backup files.
Lock screen ransomware: Locks
the user’s computer screen and
demands payment, but no personal
files are encrypted.
According to the U.S.
Department of Health
and Human Services Fall
2019 OCR Cybersecurity
Newsletter, the FBI estimates
that cybercriminals will earn
over $1 billion in ransom.
Response and recovery plan with
playbook: These should be reviewed
and updated periodically and stored in a
secure, post-attack accessible manner
(such as a printed copy).
Employee response team: Include
stakeholders across departments and
specify who will be responsible for
executing and managing the plan. Hold
training sessions and perform drills.
Communication plan: Give thought to
what will be inaccessible, and then identify
alternate means of communicating both
internally and externally.
Prioritize system recovery: Knowing
which systems need attention first and
how they interact with other systems will
facilitate a smooth and orderly recovery.
Data backup: There are so many choices
now for backup solutions, so determine
what is best for your business: locally,
offsite, cloud – you choose.
System protection: Ensure all critical
systems and data are being protected in
a manner that guarantees Recovery Point
Objectives (RPOs) and Recovery Time
Objectives (RTOs) can be met.
Tools to identify affected data:
Having this data during an attack will be
invaluable in speeding up recovery and
preserving uninfected data.
Practice your plan: Without testing, there
can be no assurance that the recovery
plan will work when an attack happens.
Testing also provides the experience and
confidence to response team members.
The U.S. Cybersecurity and Infrastructure
SecurityAgency’s (CISA) ransomware site defines
ransomware as: a type of malicious software, or
malware, designed to deny access to a computer
system or data until a ransom is paid. Ransomware
typically spreads through phishing emails or by
unknowingly visiting an infected website.
TYPES OF RANSOMWARE ATTACKS
Hardware locker: Changes the
computer’s master boot record
(MBR), preventing the operating
system from properly starting.
Application/web server encryption:
Encrypts files and web servers
through application vulnerabilities.
Ransomware as a Service (RaaS):
Widely available on the Dark Web,
RaaS enables practically anyone to
attack an organization.
Data exfiltration: Reads critical data
from the attacked systems and copies
it to the attacker.
Taking the time to prepare for
a ransomware attack is key to
successfully recovering from one.
Preparation Prevention Detection Recovery
RANSOMWARE PLAN BEST PRACTICES FOR A
SUCCESSFUL RECOVERY
BY

More Related Content

PDF
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
PPTX
3 Tips to Stay Safe Online in 2017
PPTX
Cyber Incident Response Proposed Strategies
PDF
10 ways you can lower the risk of a Ransomware attack.pdf
PPTX
440890252-RANSOMWARE.cybersecurity-ppt.pptx
PPTX
Ransomware: A Perilous Malware
PDF
Ransomware Unveiled: Understanding, Preventing, and Recovering
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
3 Tips to Stay Safe Online in 2017
Cyber Incident Response Proposed Strategies
10 ways you can lower the risk of a Ransomware attack.pdf
440890252-RANSOMWARE.cybersecurity-ppt.pptx
Ransomware: A Perilous Malware
Ransomware Unveiled: Understanding, Preventing, and Recovering

Similar to How To Prevent Ransomware (20)

PDF
AI for Ransomware Detection & Prevention Insights from Patents
PDF
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
PDF
What Ransomware Taught us in 2021?
PPTX
COMPUTER SEMINAR network security threats .pptx
PPTX
Are ransomware attacks the problem for web hosting firms?
PDF
2016 CYBERSECURITY PLAYBOOK
PDF
Ransomware Prevention Guide
PPTX
ransomware keylogger rootkit.pptx
PDF
PPTX
Common Types of Cyber Attacks & How to Prevent Them.pptx
PDF
Saiyed_Crypto_Article_ISSA
PPTX
Ransomeware and malware power point presentation
DOCX
Understanding Ransomware Attacks_ How They Work and How to Protect Yourself.docx
PPTX
Ransomware Resiliency, Recoverability and Availability
PDF
Should You Pay Ransomware.pdf
PDF
Ransomware - Information And Protection Guide - Executive Summary
PDF
What is ransomware?
PDF
Failed Ransom: How IBM XGS Defeated Ransomware
PPTX
(Training) Malware - To the Realm of Malicious Code
PPTX
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
AI for Ransomware Detection & Prevention Insights from Patents
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
What Ransomware Taught us in 2021?
COMPUTER SEMINAR network security threats .pptx
Are ransomware attacks the problem for web hosting firms?
2016 CYBERSECURITY PLAYBOOK
Ransomware Prevention Guide
ransomware keylogger rootkit.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
Saiyed_Crypto_Article_ISSA
Ransomeware and malware power point presentation
Understanding Ransomware Attacks_ How They Work and How to Protect Yourself.docx
Ransomware Resiliency, Recoverability and Availability
Should You Pay Ransomware.pdf
Ransomware - Information And Protection Guide - Executive Summary
What is ransomware?
Failed Ransom: How IBM XGS Defeated Ransomware
(Training) Malware - To the Realm of Malicious Code
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Ad

Recently uploaded (20)

PPTX
artificial intelligence overview of it and more
PDF
Testing WebRTC applications at scale.pdf
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
DOCX
Unit-3 cyber security network security of internet system
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
Internet___Basics___Styled_ presentation
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
Digital Literacy And Online Safety on internet
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
artificial intelligence overview of it and more
Testing WebRTC applications at scale.pdf
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
international classification of diseases ICD-10 review PPT.pptx
WebRTC in SignalWire - troubleshooting media negotiation
Unit-3 cyber security network security of internet system
Cloud-Scale Log Monitoring _ Datadog.pdf
Decoding a Decade: 10 Years of Applied CTI Discipline
INTERNET------BASICS-------UPDATED PPT PRESENTATION
presentation_pfe-universite-molay-seltan.pptx
Triggering QUIC, presented by Geoff Huston at IETF 123
The Internet -By the Numbers, Sri Lanka Edition
Internet___Basics___Styled_ presentation
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Digital Literacy And Online Safety on internet
SASE Traffic Flow - ZTNA Connector-1.pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
An introduction to the IFRS (ISSB) Stndards.pdf
Module 1 - Cyber Law and Ethics 101.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Ad

How To Prevent Ransomware

  • 1. Want more ransomware information? Go to ransomware.org > Ransomware Being Prepared Leads to Successful Recovery Ransomware attacks are on the rise! Enterprise data has become a very lucrative target for cybercriminals. Even with robust defense mechanisms in place, ransomware attacks continue to increase. In the first half of 2020, there were approximately 2.5 million new ransomware attacks, according to the November 2020 McAfee Labs Threat Report. Encryption ransomware: Encrypts files, folders, and shared network storage. Network-attached storage (NAS) ransomware: Encrypts and/or deletes files on home directories, virtual machine (VM) hypervisor backups, shadow volumes, and backup files. Lock screen ransomware: Locks the user’s computer screen and demands payment, but no personal files are encrypted. According to the U.S. Department of Health and Human Services Fall 2019 OCR Cybersecurity Newsletter, the FBI estimates that cybercriminals will earn over $1 billion in ransom. Response and recovery plan with playbook: These should be reviewed and updated periodically and stored in a secure, post-attack accessible manner (such as a printed copy). Employee response team: Include stakeholders across departments and specify who will be responsible for executing and managing the plan. Hold training sessions and perform drills. Communication plan: Give thought to what will be inaccessible, and then identify alternate means of communicating both internally and externally. Prioritize system recovery: Knowing which systems need attention first and how they interact with other systems will facilitate a smooth and orderly recovery. Data backup: There are so many choices now for backup solutions, so determine what is best for your business: locally, offsite, cloud – you choose. System protection: Ensure all critical systems and data are being protected in a manner that guarantees Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs) can be met. Tools to identify affected data: Having this data during an attack will be invaluable in speeding up recovery and preserving uninfected data. Practice your plan: Without testing, there can be no assurance that the recovery plan will work when an attack happens. Testing also provides the experience and confidence to response team members. The U.S. Cybersecurity and Infrastructure SecurityAgency’s (CISA) ransomware site defines ransomware as: a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website. TYPES OF RANSOMWARE ATTACKS Hardware locker: Changes the computer’s master boot record (MBR), preventing the operating system from properly starting. Application/web server encryption: Encrypts files and web servers through application vulnerabilities. Ransomware as a Service (RaaS): Widely available on the Dark Web, RaaS enables practically anyone to attack an organization. Data exfiltration: Reads critical data from the attacked systems and copies it to the attacker. Taking the time to prepare for a ransomware attack is key to successfully recovering from one. Preparation Prevention Detection Recovery RANSOMWARE PLAN BEST PRACTICES FOR A SUCCESSFUL RECOVERY BY