Are You Doing Enough To Protect Your Business From Ransomware? Probably Not

Protect Your Business From Ransomware

Ransomware is more advanced than ever. If you aren’t updating your security with that in mind, you’re in trouble. Here’s why. $6 million as ZDNet reports.

“”Researchers at Carbon Black monitored Dark web forums for offerings of ransomware and have estimated that the marketplace has grown to be worth ,237,248.90, representing a 2,502 percent increase in the sale of ransomware since 2016…”

That’s the size of the ransomware market on the dark web at the time of writing. This time last year, it was worth only $250,000. That’s a 2400% increase. And it’s really no surprise, if you stop and think about it. Criminals have long since realized that hacking into a business’s server to exfiltrate and sell data, that’s hard work. It’s both easier and more profitable to hold that data hostage and demand a payment. If even a small percentage of businesses acquiesce and pay the ransom, a criminal still makes bank. And the effort on their end is less than minimal.

It’s really no surprise, then, that we’ve seen so many global ransomware attacks this year. Nor is it any surprise that the prognosis for the future is incredibly grim. Ransomware attacks are only going to become more advanced. More targeted. More devastating. And ultimately more prevalent. With that in mind, if your business isn’t already stepping up its security in response, you aren’t doing enough. The next WannaCry or NotPetya isn’t going to wait for you to be ready. It’s going to strike when you least expect it – and probably when it’s least convenient for you, as well.

But what can you do to prepare?

A few things:

  • Backup your data. Figure out what information and systems are most critical to your business, and back them up on a daily basis. Whether you upload them to the cloud or keep them on-site, make sure they’re completely walled-off from your existing systems. Plenty of ransomware now is configured to seek out backups and encrypt them first.
  • Be quick on your feet. Monitor your systems constantly for suspicious activity – and the moment you see something that even looks like it could be ransomware, immediately air-gap the affected system. The more quickly you isolate a potential infection from your network, the less damage it can do.
  • Patch. Simply put, the majority of businesses are operating woefully insecure systems – legacy architecture that’s in desperate need of an upgrade. Given how many cyber-criminals exploit simple software vulnerabilities to target their victims, that’s unacceptable.
  • Train your workers. Spearphishing and social engineering remain some of the most effective methods of spreading malicious software. You need to make sure your employees are aware of the tactics a criminal might use – and that they know how to respond in a way that won’t put both themselves and your business data at risk.

Ransomware isn’t going away anytime soon. Business is booming for developers, and criminals everywhere have long since realized it’s the best way to make a cheap buck. Even smarter, more sophisticated hackers are likely to start using it as a smokescreen for more advanced attacks.

You need to get your security up to par immediately – because if you don’t, the next time a rampaging worm holds the world’s data for ransom, you might well be among its victims.

By Max Emelianov, CEO of HostForWeb

Jim Fagan

Behind The Headlines: Capacity For The Rest Of Us

Capacity For The Rest Of Us We live in the connected age, and the rise of cloud computing that creates previously unheard of value in our professional and personal lives is at the very heart ...
Threat Security

Azure Red Hat OpenShift: What You Should Know

Azure Red Hat OpenShift: What You Should Know What Is Azure Red Hat OpenShift? Red Hat OpenShift provides a Kubernetes platform for enterprises. Azure Red Hat OpenShift permits you to deploy fully-managed OpenShift clusters in ...
David Loo

The Long-term Costs of Data Debt: How Inaccurate, Incomplete, and Outdated Information Can Harm Your Business

The Long-term Costs of Data Debt It’s no secret that many of today’s enterprises are experiencing an extreme state of data overload. With the rapid adoption of new technologies to accommodate pandemic-induced shifts like remote ...
Matrix

Are We Building The Matrix?…

When sci-fi films like Tom Cruise’s Oblivion depict humans living in the clouds, we imagine that humanity might one day leave our primitive dwellings attached to the ground and ascend to floating castles in the ...
Fernando Castanheira

How the Shift to Hybrid Work Will Impact Digital Transformations

The Shift to Hybrid Work Before COVID-19, most enterprises had a digital transformation in flight, but the pandemic threw those programs into hyperdrive. Scrambling to accommodate workforces that were suddenly working online and mostly from ...

CLOUD MONITORING

The CloudTweaks technology lists will include updated resources to leading services from around the globe. Examples include leading IT Monitoring Services, Bootcamps, VPNs, CDNs, Reseller Programs and much more...

  • Opsview

    Opsview

    Opsview is a global privately held IT Systems Management software company whose core product, Opsview Enterprise was released in 2009. The company has offices in the UK and USA, boasting some 35,000 corporate clients. Their prominent clients include Cisco, MIT, Allianz, NewVoiceMedia, Active Network, and University of Surrey.

  • Nagios

    Nagios

    Nagios is one of the leading vendors of IT monitoring and management tools offering cloud monitoring capabilities for AWS, EC2 (Elastic Compute Cloud) and S3 (Simple Storage Service). Their products include infrastructure, server, and network monitoring solutions like Nagios XI, Nagios Log Server, and Nagios Network Analyzer.

  • Datadog

    DataDog

    DataDog is a startup based out of New York which secured $31 Million in series C funding. They are quickly making a name for themselves and have a truly impressive client list with the likes of Adobe, Salesforce, HP, Facebook and many others.

  • Sematext Logo

    Sematext

    Sematext bridges the gap between performance monitoring, real user monitoring, transaction tracing, and logs. Sematext all-in-one monitoring platform gives businesses full-stack visibility by exposing logs, metrics, and traces through a single Cloud or On-Premise solution. Sematext helps smart DevOps teams move faster.