Page 6 - Sophos - Ransomware Special Edition
P. 6

TRENDING STORY  common. Since the








         outbreak of WannaCry,
         cybercriminals have
         diversified their attack
         vectors to launch
         ransomware attacks.
            “Cyber attackers
         are now also
         targeting SMEs and
         start-ups owing to
         a lack of a strong
         security framework
         and cybersecurity
         awareness. SMEs have
         not paid due attention
         to their cybersecurity
         needs, as they were
         under the impression        make businesses more        has undoubtedly            How Can Businesses
         that they were too          vulnerable to automated  exacerbated                   Best Defend Against
         small a target for          and mass targeted           ransomware activity as     Attacks?
         cybercriminals to plan      attacks. In addition        cybercriminals look to
         an attack on,” states       to this, the need to        infiltrate organizations’     Well, according
         Kaura of Kaspersky.         equip and enable an         networks by exploiting     to experts,
                                                                 security vulnerabilities   organizations should
                                                                                            adopt the following
                                                                 in remote-desktop          anti-ransomware
                                                                 protocols combined         measures:
                                                                 with the use of weak
                                                                                               •  Train employees
                                                                 passwords.                 how following
              Cybercriminals                                       Many times, it is        simple rules can help
              have escalated                                     not just enough to put     a company avoid
          their attacks to another                               a cybersecurity layer      ransomware incidents.
       level, siphoning off sensitive                            to the network and
     information from organisations                              devices.                      •  Always update
      whose files they’ve encrypted.                               “Cyber-attacks do not    your operating
       The belief is that naming and                             just take place in a day.   system and software
       shaming these victims would      aDam palmer              They are meticulously      to eliminate recent
          encourage them to pay                                  planned and are being      vulnerabilities.
           the ransom demand            Chief Cybersecurity      put in action to erode     •   Protect data in the
                                        Strategist, Tenable                                    public cloud, private
                                                                 the security, allowing
                                                                 the entire network to         cloud, and on-
                                                                                               premises. Almost six
                                                                 get hijacked by the           in 10 ransomware
                                     unexpectedly remote         attackers. Hence, it is
         Reasons That Have           workforce has left          not enough to have            attacks that
                                                                                               successfully encrypted
         Contributed to an           companies open to           a security layer to the       data included data in
         Increase in Attacks         attack.                     networks, and it is more      the public cloud.
            Lack of specialized         According to             about being constantly     •   Make regular backups
         cybersecurity teams         Adam Palmer,                aware and mindful of          and store them
         and constrained             Chief Cybersecurity         the potential threats,”       offsite and offline.
         cybersecurity budgets       Strategist, Tenable,the     explainsThadhani.             More than 55% of
                                     shift to remote work

       6 27          NOVEMBER 2020
                     NOVEMBER 2020
   1   2   3   4   5   6   7   8   9   10   11