The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]
  1. Conduct proper and timely backups of your data so it can be used to restore original files after a data loss event
  2. Use a security solution (Kaspersky is an excellent example) with behaviour based detection technologies. These technologies can catch malware, including Ransomware, by watching how it operates on the attacked system and making it possible to detect fresh and yet unknown samples of Ransomware
  3. Visit The “No More Ransom” website, an initiative by the Dutch police National High Tech Crime Unit, Europol’s European Cybercime Centre, Kaspersky Lab and Intel Security with the goal to help victims of Ransomware retrieve their encrypted data without having to pay the criminals
  4. Audit installed software, not only on endpoints, but also on all nodes and servers in the network and keep it updated
  5. Conduct a security assessment of the control network (i.e. a security audit, penetration testing, gap analysis) to identify and remove any security loopholes. Review external vendor and 3rd party security policies in case they have direct access to the control network
  6. Request external intelligence: intelligence from reputable vendors helps organizations to predict future attacks on the company
  7. Educate your employees, paying special attention to operational and engineering staff and their awareness of recent threats and attacks
  8. Provide protection inside and outside the perimeter. A proper security strategy has to devote significant resources to attack detection and response in order to block an attack before it reaches critically important objects