• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  4 Ransomware Protection Tips for Your Business
Ransomware
09 March 2016

4 Ransomware Protection Tips for Your Business

Written by Rahul Thadani
Rahul Thadani
Security
Estimated reading time: 3 minutes

If you haven’t already heard, the threat of ransomware is firmly hovering over many business enterprises. Without the right security measures and proactive crisis management, ransomware can be debilitating for even the most stable business entities. A recent high-profile incident where a Hollywood based hospital was subjected to a ransomware lockdown is just the latest in a long string of public attacks. It was demanded that the hospital pay $3 million but they seemingly made do with just $17,000 instead.

Hack Brief: Ransomware hits Mac OS X for the first time https://t.co/yBW5Ad3p9R

— WIRED (@WIRED) March 8, 2016

Our Threat Research Labs have recently blocked over 400,000 samples of ransomware as well and this does not bode well for the nation as India is ranked quite high in the list of Asian countries that are targeted by ransomware attacks. Ransomware enters networks and systems through various sources, but their mode of operation and end results are almost always the same. So what can be done to protect your networks against ransomware? Knowing these 4 guidelines may just help you turn the tide in this fight, irrespective of whether you are a business organization, a government institution or a home consumer.

Maintain as many backups as possible

Have you heard of the 3-2-1 rule? When it comes to data backup you need to maintain 3 different copies of your critical information, save it over 2 different formats, out of which 1 format should be entirely offline. This will ensure that your data always remains under your control and even if you do end up as a victim of ransomware, you have enough backups to stick to your guns and not give in to the attacker’s demands. Simply backing up your data to an external hard drive is not enough as ransomware samples are advanced enough to infect connected devices as well.

For data backup best practices, follow the 3-2-1 rule. Make 3 different copies of the data over 2 different formats with 1 format offline.

— Seqrite (@Seqrite) March 9, 2016

Ransomware has capabilities to get into more than just your PC now

Almost 90% of computers around the world run on Windows, so ransomware is also designed to attack Windows based PCs more than any other machines. However, it is not uncommon to find ransomware samples that work just as effectively over Android or Linux as well. Even Mac users, who wrongfully think they are not vulnerable to such attacks, are targets now as the recent Mac OS X ransomware attack has showed. New Internet of Things (IoT) connected devices are also coming under the scanner so ransomware can strike at any point.

Think very carefully before actually paying the ransom
 
In situations where a company’s data has been seized and a ransom is demanded to unlock it, it can be very easy to give in to the demands of the attackers. However, this is something that should be carefully pondered over as paying the ransom does not provide any guarantee that the data will be recovered. Moreover, it can be assumed that the attacker will surely keep a copy even if he does return the information. The best solution is to be prepared by keeping multiple backups of this information so that if the time comes, the organization does not need to back down in the face of ransom demands.

data backup

Adopt preventive technologies and training for preemptive action

In cases such as this, prevention really is the best cure. Invest wisely in solutions that detect ransomware and block them. Spend time and resources towards training your employees about the risks of ransomware and how they commonly enter networked systems. With proactive actions and vigilant monitoring, such threats can be avoided before they cause significant damage to your enterprise. Be wary of email attachments, malicious websites, unpatched programs and operating systems, and suspicious applications.

 Previous PostSmart Homes and the Internet of Things (IoT)
Next Post  How Seqrite’s Device Control Upholds Security Compliance
Rahul Thadani
About Rahul Thadani

Rahul is a web enthusiast and blogger, and has been writing about the computer security industry for the last three years. Following the latest technology trends,...

Articles by Rahul Thadani »

Related Posts

  • Is your Router exposed to cyber threats

    Is your router exposed to cyber threats? Here is how to safeguard it.

    July 30, 2020
  • Snake ransomware stings to spread its venom in the veins of enterprise networks.

    Snake Ransomware brings impending doom to enterprise networks

    July 10, 2020
  • APT harbingers are using Honey Traps to attack Indian Defence.

    Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

    July 8, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.