Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE

Two simple steps to strengthen defense against ever evolving ransomware

Micro Focus Contributor
Micro Focus Contributor
0 0 1,838

There will be a ransomware attack on businesses every 14 seconds by the end of 2019, up from every 40 seconds in 20161. According to a FBI internet crime report2, “The FBI does not support paying a ransom to the adversary. Paying a ransom does not guarantee an organization will regain access to their data; in fact, some individuals or organizations were never provided with decryption keys after having paid a ransom.” To combat such a dilemma, organizations must proactively strengthen their ransomware defense.

Two simple steps to strengthen defense against ever evolving ransomware.pngIn the case of the WannaCry ransomware attack, Microsoft actually released a patch to address the issue prior to the attack. Unfortunately, many systems are not kept up-to-date with the patch and fell victim to the attack. As for the SynAck attack, the malware utilized a new technique, Doppelgänging, to circumvent detection. 

As security software strives to address the evolving ransomware variants, cybercriminals will continue their core mission in developing new ways to gain entry. While this cat and mouse game lingers on, the risks of productivity disruption and financial loss have reached a point where organizations cannot afford to solely rely on malware detection alone. 

The good news is that you can stop ransomware in its tracks with an easy 2-step approach to protect your end-point devices. First step is to ensure that current data are backed up according to policies, and are ready for easy restore. Next step is to ensure your end-point devices are managed in a comprehensive manner to minimize malware infestation.  Join us in our “Close the Gap in Your Ransomware Defense” webinar to learn how Micro Focus endpoint backup and endpoint management can help simplify these steps and win the high-stakes battle against ransomware.

 

1 – Cybesecurityventures.com

2 -2017 Internet Crime Report

About the Author
Joe has over 13 years of experience in technology marketing and is currently focused on the analytics solution portfolio. Prior to this role, he was responsible for product marketing of the enterprise application data management solution.
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.