Update on Ransomware Technology 60 Minutes Video ransomware ( noun) - - PowerPoint PPT Presentation

update on ransomware technology
SMART_READER_LITE
LIVE PREVIEW

Update on Ransomware Technology 60 Minutes Video ransomware ( noun) - - PowerPoint PPT Presentation

Update on Ransomware Technology 60 Minutes Video ransomware ( noun) A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users files unless a ransom is paid.


slide-1
SLIDE 1

Update on Ransomware Technology

60 Minutes Video

slide-2
SLIDE 2

Update on Ransomware Technology

A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the user’s files unless a ransom is paid.

ran·som·ware (noun)

slide-3
SLIDE 3

Update on Ransomware Technology

Popular Targets

  • Computers
  • Endpoints on company network
  • Servers

Prevents you from using your PC You will be asked to do something before you can use your PC

RANSOMWARE CHARACTERISTICS

slide-4
SLIDE 4

Update on Ransomware Technology No Guarantees

  • No guarantee that paying the fine or doing what the ransomware tells

you will give access to your PC or files again

  • Usually impossible to reverse-engineer the encryption or “crack” the

files without the original encryption key – only the attackers have access to

How it works…

Infiltrates Your PC, Network or Servers

  • Prevents you from accessing Windows
  • Encrypts files so you can't use them
  • Stops certain apps from running (like your web browser)

“Ransom” Demand

  • Demands that you pay money (a “ransom”) to get access to your PC or

files

  • Some make you complete surveys
slide-5
SLIDE 5

Update on Ransomware Technology

Internal Use Only

The Rise of Ransomware: Is Your Organization Prepared?

slide-6
SLIDE 6

Update on Ransomware Technology

Quick Question

Have you had a security breach?

6

slide-7
SLIDE 7

Update on Ransomware Technology

Ponemon Institute

What are the odds of…

slide-8
SLIDE 8

Update on Ransomware Technology

It’s affecting everyone – 2018 breaches

slide-9
SLIDE 9

Update on Ransomware Technology

Source: Datto

slide-10
SLIDE 10

Update on Ransomware Technology

Source: Datto

slide-11
SLIDE 11

Update on Ransomware Technology

Source: Datto

slide-12
SLIDE 12

Update on Ransomware Technology

91% Of Cyber Attacks Start With A Phishing Email

slide-13
SLIDE 13

Update on Ransomware Technology

Source: Datto

SPAM/Phishing Emails Lack of Employee Training Malicious Websites/Web Ads Other Lack of Security

slide-14
SLIDE 14

Update on Ransomware Technology

Phishing Emails

Example 1 Example 2 Beware of attachments! Beware of sender & links!

slide-15
SLIDE 15

Update on Ransomware Technology

Sample Ransom Demand

slide-16
SLIDE 16

Whaling Emails

Enter confidential company information and passwords to carry

  • ut fraudulent activities

Convince executive that the email requires urgent action by following a link to a fake website

slide-17
SLIDE 17

Update on Ransomware Technology

Whaling Executives

TheWindowsClub.com

slide-18
SLIDE 18

Update on Ransomware Technology

SMS Text Cyber Attacks

slide-19
SLIDE 19

Update on Ransomware Technology

  • Valuable data to target

฀ Credit card information ฀ Client data ฀ Employee records ฀ Financial reports

  • Organizations with inadequate protection
  • SMB’s as a gateway to large corporations

What do Hackers target?

slide-20
SLIDE 20

Update on Ransomware Technology

Risk Prevention Best Practices

slide-21
SLIDE 21

Update on Ransomware Technology

Steps to Cyber Security

Network Security

  • Protect network from external and

internal attack

Malware Prevention

  • Policies and defenses across entire
  • rganization

Monitoring

  • Continuously monitor all systems

and networks for unusual activities

Incident Management

  • Establish incidence response and

disaster recovery capabilities

Home & Mobile Working

  • Develop mobile working policy and

train staff to adhere to it

Secure Configuration

  • Apply security patches and maintain

secure configurations

Removable Media Controls

  • Policy to control access to removable media
  • Scan all media before importing into corporate

systems

Managing User Privileges

  • Limit user privileges and monitor user

activity

User Education and Awareness

  • Staff Training program
  • Maintain user awareness of cyber risks
slide-22
SLIDE 22

Update on Ransomware Technology

EDUCATION PROTECTION RECOVERY Enhanced Risk Mitigation

Popular Precautionary Measures:

  • 1. Identify Vulnerabilities - Risk Assessment
  • 2. Train People - 1st Line of Defense
  • 3. Deploy Intrusion Detection & Intrusion Prevention Solutions
  • 4. Backup…Backup….Backup – Constantly & Frequently
  • 5. Test Recovery - Data restoral process & results
slide-23
SLIDE 23

Update on Ransomware Technology

User Awareness Training

slide-24
SLIDE 24

Update on Ransomware Technology

฀ WEBSITES: Avoid visiting unsafe, suspicious, or fake websites ฀ WEB PAGES: Don’t click on a link on a webpage unless you absolutely trust the page or sender ฀ EMAIL: Don’t open emails and email attachments from people you don’t know, or that you weren’t expecting ฀ SOCIAL MEDIA: Don’t click on malicious or potentially bad links on Facebook, Twitter and other social media posts ฀ LOOK FOR TYPOS: Often fake emails and webpages have bad spelling, unusual spaces, odd symbols / punctuation or just look unusual.

  • Ex:“PayePal” instead of “PayPal”
  • Ex. “iTunesCustomer Service” instead of “iTunes Customer

Service”

General Rule: If you’re unsure – don’t click it!

END USER RISK MITIGATION

BEST PRACTICES

slide-25
SLIDE 25

Update on Ransomware Technology

Detect | Prevent | Mitigate System Mitigation Tools

slide-26
SLIDE 26

Update on Ransomware Technology

rethink BACKUP

start thinking

CONTINUITY

slide-27
SLIDE 27

Update on Ransomware Technology

Source: Datto

slide-28
SLIDE 28

Update on Ransomware Technology

Engage Security Experts

฀ Conduct Security Risk Assessment ฀ Train your Employees ฀ Protect network and devices ฀ Keep software up to date ฀ Create cybersecurity policies ฀ Back up data frequently ฀ Test restores ฀ Enable Uptime

Option 1

Where do we go from here?

Option 2

slide-29
SLIDE 29

Update on Ransomware Technology

✔ Assess ✔ Educate ✔ Reinforce Awareness ✔ Measure Your Employee’s Security Effectiveness ✔ Create Human Firewalls ✔ Create a security awareness culture

Risk Mitigation Best Practices

slide-30
SLIDE 30

Update on Ransomware Technology

Contact Information

Justin Schwartz 917-647-3431 jschwartz@tomorrowsoffice.com Brian T Campbell 845-418-4829 Brian.Campbell@rocklandpros.com