Ransomware Infections Continue To Make Headline News

As the ransomware infections continue to make headline news, we are striving to provide pertinent information to all we have business dealings. Though there is no one silver bullet to protect a network from these insidious infections, there are multiple configurations that applied in a Defense in Depth approach can substantially reduce the likelihood.

First, as we have done at the majority of our clients with Unified Threat Managements firewalls the detection and blocking of Botnet Command and Control servers is critical. In conjunction with the detection and blocking, application control at the gateway perimeter is a necessity. Then at the End Point Protection level additional application control mechanisms should be applied. Application Control is basically a mechanism whereby if an application is not known as legitimate it is blacklisted.

For those that have not applied these protections please either execute the necessary steps or contact us for assistance in these matters.

The following are some additional steps that as an aggregate can strengthen your security posture:

  1. Test your backups. Don’t just depend of the notifications that a backup executed, but actually perform test restores.
  2. It’s critical no matter what media you use for backups, that you have multiple media including those that are not connected to your network.
  3. If using Cloud based backups insure that you have selected multiple revisions, for if only one version exists it can be compromised as well.
  4. Configure Software Restrictions via Group Policy to block common areas that ransomware exploits.
  5. Configure file type restrictions to block common ransomware extensions. 6. Block all email except corporate email access.

If you need any assistance with these various protection implementations please don’t hesitate to contact your MTBW representative.

Please follow and like us: