10 best practices to prevent ransomware attacks
Overview
Ransomware, a type of malicious software that blocks access to computer systems and data, is one of the most common adverse cyber events. Read on to learn more about ransomware and how to prevent it from disrupting your operations. Want to learn more about Ransomware Insurance? Read more here.
Additional Resources:
Coalition's Guide to Cyber Insurance
Preserving Data Privacy in a Digital Age
Ransomware Claim Illustrates Importance of Early Reporting The Evolution of Ransomware — a cyber claims perspective
Cyber insurance coverage checklist: Ensure you’re covered for these 5 common cyber exposures
Maintaining Credible Data Backups to Minimize Downtime
Threat Actors Aren’t Targeting Your Business — You’re Just Making the Cash Grab Easy
What is a ransomware attack?
Ransomware is a type of malware attack that restricts access to computer systems, files, and networks. Cybercriminals launch ransomware attacks by deploying malicious software via emails, links, and attachments. After gaining access to an organization's network, they can deploy the ransomware itself, which encrypts devices and files, rendering them inaccessible for users. The hackers then hold all systems and data hostage until a ransom is paid. Ransomware threatens businesses across all industries. In a recent example, financial technology provider NCR suffered a ransomware attack that left 100,000 restaurant customers without access to back-office payment tools and gift card functions. Ransomware attacks are dangerous because they put businesses at the attacker’s mercy. What’s more, cybercriminals don’t always restore access after receiving payment. As a result, the FBI discourages businesses from making ransom payments. The amount of ransom hackers expect is often based on the size of the company and the industry it operates in. For example, cybercriminals demanded $70 million in bitcoin from IT provider Kaseya after a ransomware attack. Separately, hackers hit German chemical distributor Brenntag with a $7.5 million ransom.
What are the 10 tips to prevent a ransomware attack?
Ransomware attacks are ubiquitous and expensive to remediate. While you can’t prevent bad actors from targeting your business with ransomware, you can use these tips to protect against it:
1. Turn on multi-factor authentication
2. Run security awareness training
3. Update vulnerable servers
4. Use strong passwords
5. Implement endpoint detection and response
6. Establish a regular patch cadence
7. Implement secure remote access
8. Prioritize account maintenance
9. Maintain backups
10. Use attack surface monitoring
Best practices for preventing a ransomware attack
Unfortunately, there isn’t a silver bullet for preventing a ransomware attack. Threat actors constantly adjust their tactics and procedures to evade defenses — forcing businesses to use a variety of defense strategies to protect themselves. So, how do you prevent ransomware attacks? Follow this ransomware prevention checklist to start moving in the right direction.
1. Turn on multi-factor authentication
Ransomware attacks often start when threat actors access user accounts or networks. Because of this, the best way to prevent a ransomware attack is to use multi-factor authentication (MFA), an identity verification strategy that requires users to provide multiple authentication credentials during login attempts. With MFA in place, a threat actor must bypass multiple checkpoints to gain access. There are three main MFA methods: knowledge, possession, and inherence.
Knowledge-based MFA relies on facts that users know. Examples include passwords, personal identification numbers, and personal security questions — like a pet’s name or birthplace.
Possession-based MFA leverages user items like an employee’s phone. For example, a company might send a one-time password (OTP) via email or SMS. Companies may also grant access using software certificates or physical objects like USB devices.
Inherence-based MFA grants access via unique identification factors, including facial recognition, fingerprints, and other biometric identifiers.