6 steps to respond to cyber attacks and request a ransom
6 steps to respond to cyber attacks and request a ransom

In the past 18 months, major media outlets have lost awareness of ransom attacks in the region as before. However, this does not mean that these threats have finally vanished.

Of course, there is no satisfaction with the fight against these security threats as more work needs to be done to focus on malicious ransom attacks that have struck multiple targets recently.

The F5 network reviewed six basic steps in response to a ransom requiring a ransom:

Use strict network security guidelines

No savings in security and protection. First, invest in a sophisticated corporate culture based on information security.

The initial cost of doing so may delay some smaller projects, but it is less expensive than successfully attacking your business.

Ensures secure authentication of applications that can be accessed from outside the network

Using strong authentication methods to secure communications for applications that can be accessed outside of the network is the first step in obtaining the necessary protection against ransom attacks. Here it is recommended to use an authentication method consisting of several factors. At the very least, you should immediately start breaking into standard passwords and known credentials.

Employee training

Your employees must have sufficient information about the consequences of a harmful ransom attack and the safety risks you should always protect. The first step is to educate employees about the phishing technique used. Of course, you should question attachments and links. According to Ph5 Ph5 2019 phishing scams and phishing scams, up to 71% of phishing sites analyzed with HTTPS appear to be more legitimate. The report also concluded that the most ridiculous services and brands are Facebook, Apple and Microsoft Office Exchange.

Check and filter internet traffic

You need to use high level surveillance and encrypted web communications context to block malicious websites and extensions that automatically issue control and connection commands before entering the network. Most malware is hosted on popular websites. Therefore, the content transmitted via SSL and TLS protocols must be decrypted to ensure that it is scanned by security devices.

Back up important files

Securing all important personal data systems and systems. These backups should also be kept offline to protect them from ransom attacks. Regular simulations are also recommended, with training on how to recover information after ransom attacks.

Network isolation

The most deadly attackers can get all available systems once they reach the target network. Reliance on flat grid design should be avoided. This means that all affected systems must go through other filtering tools and access controls before leaving the local resource group.

On this occasion, David Warburton, Head of Security Research at F5 Networks, said, "Despite the low importance of ransom attacks, these attacks seem to have reached a new level of precision in their strategy, including focusing on a group of public entities who have been paralyzed. Isolation from the network is a result of these attacks, including many schools, communities, and government agencies.

Previous Post Next Post