Create, update, segregate and protect viable backups.Institute least privilege policies for data/system access.
In Kroll’s experience, six fundamental security steps can deliver immediate layers of protection from ransomware: Knowing what kind of data you have and everywhere it is collected, used and stored is imperative. Almost overnight, ransomware attacks morphed from mainly expensive operational disruptions to crises fraught with regulatory data privacy and breach notification issues. Starting last year, many ransomware actors threatened to release stolen data to pressure victims into paying ransoms. Second, data mapping inventories are more important than ever. Matthew Dunn, Associate Managing Director, Cyber Risk. This lack of awareness delayed the initial remediation, especially when combined with limited viable backups for restoration. Unfortunately, the IT director was unaware of how many servers were on the network. When a local government was victimized by ransomware, it impacted the municipality’s police and fire dispatch systems, online utility payment system, centralized accounting system and many other critical segments on its network. First, that means taking the time to accurately and regularly document the entire configuration of your network. While completely preventing ransomware attacks is nearly impossible, security and risk management professionals can take proactive steps to neutralize or mitigate their harm. Proactive Preparation Is the Best Protection Against Ransomware