Whitepaper: Ransomware and how to detect it before it is too late

0
80

LogRhythm has released a whitepaper talking about one of the biggest cybersecurity threats, ransomware.

While ransomware and other cyberthreats are constantly evolving, some of the basics of ransomware attacks as well as how to detect it or even protect from it have not significantly changed.

In addition to talking about the history of ransomware and how it has already shifted from individuals to organizations, which are a more lucrative target for cyberattack, the whitepaper also details phases of a ransomware attack, which include exploitation and infection, delivery and execution, backup spoilation, file encryption, and user notification and clean-up as the final phase.

The whitepaper also gives a couple of steps that can allow you to detect and prevent ransomware attacks and while these are mostly common security moves that should be done even without the fear of ransomware, some are specific to such attacks.

The main thing is constant and aggressive patching, which should prevent malware and limit vulnerabilities, as well as creating and updating backups. Some of the other steps include protecting endpoints, educate users, which are usually the biggest and the weakest link, assign privileges to certain users, and prepare a response plan in case the attack ever happens.

Ransomware attacks are becoming both common as well as more sophisticated and while these are constantly evolving, and as the results of a successful attack are usually higher than the ransom, there are plenty of ways to prevent these attacks and cybersecurity vendors are still keeping up with these cyberthreats.

You can download the full whitepaper, titled “The Ransomware Threat – A guide to detecting an attack before it’s too late”, directly from LogRythm’s website (possible registration required).

 

SHARE
Previous articleIntel and Red Hat explain LT1F in a couple of videos
Next articleNew Windows 10 zero-day vulnerability spotted
Slobodan Simic is foremost an IT enthusiast who discovered his knack for writing, which lead to becoming both an IT journalist and later an Editor for a number of publications. He has been covering anything from the consumer- and professional-oriented hardware to software markets and networks. With a focus on chasing down leads, making sure that fresh content is ready for publishing, as well as keeping up with the evergrowing and evolving IT world, writing has become more of his passion rather than just a job.