Home » Ransomware » Page 4

Ransomware

Why Immutable Architecture is Key to Protecting Backup Data

Ransomware and other malware are a constant threat, and data backup is critical to safeguard a business’ most important asset. However, cybercriminals are increasingly targeting and encrypting backup data copies as well, a strategy that leaves organisations unable to recover unless they pay the ransom. Keeping an immutable copy of backup data is a best practice for data protection and is the solution in the event of a successful two-pronged ransomware attack. What is an immutable architecture? For data to be immutable means that it is unable to be changed over a period of time. With an immutable architecture, when retention policies are set for data backup and recovery, data will be secured, locked and unchangeable for that retention period. This in turn means that it cannot be encrypted b...

Ireland’s health service IT systems shut down by ransomware attack

Ireland’s health service said it was under a ransomware attack on Friday that forced it to shut down its computer systems. A ransomware attack locks users out of their computer systems until they pay a fee to the intruder. There were few details, but the attack was described as significant by Ireland’s Health Service Executive. Motorists line up for fuel at one of the few remaining gas stations that still has fuel in Arlington, Virgina, on May 13, 2021. AFPBiden says oil pipeline back in operation after cyber attack It said it was shutting down all its IT systems to protect them from the attack while it consulted security partners. Covid-19 vaccinations would still go ahead as planned, the agency said. “We apologise for inconvenience caused to patients and to the public and will give furth...

8 Ways to Protect Against Ransomware Attacks

Ransomware attack trends continue to evolve, and the current iterations are no exception. During the last year, malicious actors have attacked healthcare organisations, medical trials, schools, and shipping agencies. Considering the impact these modern attacks can have on organisations everywhere, no matter the industry, security professionals must always be ready to secure their systems, networks, and software in new ways. And according to a recent FortiGuard Labs global threat landscape report, ransomware remains a prolific threat that increased in 2020 and is set to more disruptive. With that in mind, here are eight ways to create a strong ransomware mitigation strategy: Continuously providing employees with updates on new social engineering attack methodologies so they know w...

Here’s How Much it Costs to Recover from a Ransomware Attack in 2021

Sourced from International IDEA The cost of an average ransomware attack has more than doubled in a year, increasing from $761,106 in 2020 to $1.85 million in 2021. According to “The State of Ransomware 2021” report from Sophos, the average ransom paid is $170,404. While the number of organizations that experienced a ransomware attack fell from 51% of respondents surveyed in 2020 to 37% in 2021, and fewer organizations suffered data encryption as the result of a significant attack (54% in 2021 compared to 73% in 2020), the new survey results reveal worrying upward trends, particularly in terms of the impact of a ransomware attack. “The apparent decline in the number of organizations being hit by ransomware is good news, but it is tempered by the fact that this is likely to reflect, at...

6 Tips to Defend Against Ransomware Attacks

Over the last few years, the number of users encountering targeted ransomware – malware used to extort money from high-profile targets, such as corporations, government agencies, and municipal organisations – increased by 767%. With that in mind, here are 6 things you can do to defend against ransomware attacks: Assume you will be hit. Ransomware remains highly prevalent – no sector, country or organization size is immune from the risk. It’s better to be prepared, but not hit, rather than the other way round. Make backups and keep a copy offline. Backups are the main method organizations surveyed used to recover their data after an attack. Opt for the industry-standard approach of 3:2:1 (three sets of backups, using two different media, one of which is kept offline). Deploy layered protect...

6 Ways to Protect Your Business from Ransomware

With an ever-growing number of people working from home, primarily due to the global COVID-19 pandemic, cybersecurity attacks are on the rise, meaning that dealing with security risks is an ongoing journey for enterprises. IDC predicts that by 2023, 60% of data will be generated at the edge by people working from home and from devices outside of the corporate firewall. While at the same time, many corporate cloud services are already being rendered from locations outside the data centre. This has given rise to ransomware attacks as many employees who are working remotely have their firewalls and access points configured to allow remote access. With that in mind, here are 6 things Kaspersky experts recommend to protect your company from ransomware: Always keep software updated on all t...

South Africa Ranked as 3rd Most Targeted Country by Ransomware

Over the last few years, the number of users encountering targeted ransomware – malware used to extort money from high-profile targets, such as corporations, government agencies, and municipal organisations – increased by 767%. This increase in targeted ransomware occurred alongside a 29% decrease in the overall number of users affected by any kind of ransomware, with WannaCry still the most frequently encountered family. These are among the most important findings in Kaspersky’s recent report on the ransomware landscape from 2019-2020. The ransomware threat – when attackers encrypt private information and hold it to ransom – became mainstream news in the 2010s following large-scale outbreaks, such as WannaCry and Cryptolocker. They targeted tens of thousands of users and often requested r...

7 Ways to Protect Organisations from Ransomware Attacks

Sourced from International IDEA Over the past few years, the methods cybercriminals use to distribute ransomware has changed dramatically. While a few years ago, they would spread encrypted files on a large scale, today, their ransomware attacks have become more focused. Now, fraudsters examine the target in detail and research each target, looking for additional leverage. In order to protect business data from ransomware attacks, experts at Kaspersky recommend these seven tips: Installing only applications obtained from reliable sources from official websites Always have fresh backup copies of your files, so you can replace them in case they are lost (e.g. due to malware or a broken device). Remember to store them, not only on the physical object but also in the cloud for greater reliabil...

5 Ways Cybercriminal Gangs Use Ransomware

Over the past few years, the methods cybercriminals use to distribute ransomware has changed dramatically. While a few years ago, they would spread encrypted files on a large scale, today, their ransomware attacks have become more focused. Now, fraudsters examine the target in detail and research each target, looking for additional leverage. Infamous ransomware gangs behave like fully-fledged online service providers, using traditional marketing techniques. And according to Kaspersky, Internet users can see five clear examples of this transformation by looking at Darkside ransomware gang: 1. Darkside actively establishes contact with the press On their website, there’s a semblance of a press centre set up to enable journalists to ask questions and receive first-hand information and learn a...

Are You Prepared to Prevent Data Loss?

Losing valuable data is one of the worst things that can happen to anyone – digitally, at least. Imagine losing critical data that you need to deliver a time-sensitive project with a deadline looming, like a school assignment – or documents needed when you’re applying for a grant, or even a freelance job you’ve taken on. The team at ESET, global leaders in cybersecurity, dissect the various aspects of not having a backup when experiencing data loss, and what to do in case that happens to you. What are the impacts of data loss? The impact of data loss may vary depending on what kind of data is lost, and when during your process it happens. And of course, the amount of time spent trying to recover it or trying to recreate it.  Had you regularly backed up all the important data during yo...

5 Things to Do After a Ransomware Attack

In South Africa, 42% of ransomware victims pay the ransom to restore access to their data. Yet for 19% of those, paying the ransom did not guarantee the return of stolen data. However, as public awareness of potential cyber threats grows there is the reason for optimism in the fight against ransomware. Ransomware is a type of malware which criminals use to extort money. It holds data to ransom using encryption or by locking users out of their device. According to a report from Kaspersky, whether they paid or not, only 24% of victims were able to restore all their encrypted or blocked files following an attack. 61% lost at least some files, 32% lost a significant amount, and 29% lost a small number of files. Meanwhile, 11% who did experience such an incident lost almost all their data. “Thi...

3 Cybersecurity Trends for 2021

Sourced from International IDEA In 2020, there were many rapid changes on a global scale as organizations across the world attempted to adapt to a new normal caused by the pandemic. Amid this shift, there were significant developments seen across the cyberthreat landscape. Going into 2021 and beyond, we face another significant shift with the rise of new intelligent edges, which is about more than just end-users and devices remotely connecting to the network. The intelligent edge is a target Over the past few years, the traditional network perimeter has been replaced with multiple edge environments, WAN, multi-cloud, data centre, remote worker, IoT, and more, each with its unique risks. One of the most significant advantages to cybercriminals in all of this is that while all of these edges...