Information Security Manager at a retailer with 10,001+ employees
Real User
Top 5
2021-05-11T18:35:54Z
May 11, 2021
Proactive: Patch Mgmt Program, Continuos Vulnerability Scanner (search and fix), Monitoring by SOC/NOC or others secutiry tools (like a HIDS or NIDS components). Reactive: Incident Mgmt Plans categorized and specific by typication, BCP (complete Business Continuity Plan not only Disaster Recover Plans) and, mainly, verified backups tapes/medias (if possible, stored out of company, with continuous restore tests).
there are different solutions for ransomware these days. Best i have found is trendmicro end point protection for end users since it has a feature of stopping the attack or as soon as it says changes in files , it starts making a back up copy of it , so even if you get infected by ransomware, you still have a good chance to recover your data.
A business endpoint is any device (such as mobile phone, desktop, laptop, tablet, server, or any virtual environment) that is physically an endpoint on a business’s enterprise computer network.
Install all security updates, create an incident response plan, use whitelisting to the maximum.
Look at the ACSC Essential Eight. If you can implement all of these then you will be highly unlikely to get hit by ransomware.
Proactive: Patch Mgmt Program, Continuos Vulnerability Scanner (search and fix), Monitoring by SOC/NOC or others secutiry tools (like a HIDS or NIDS components).
Reactive: Incident Mgmt Plans categorized and specific by typication, BCP (complete Business Continuity Plan not only Disaster Recover Plans) and, mainly, verified backups tapes/medias (if possible, stored out of company, with continuous restore tests).
there are different solutions for ransomware these days. Best i have found is trendmicro end point protection for end users since it has a feature of stopping the attack or as soon as it says changes in files , it starts making a back up copy of it , so even if you get infected by ransomware, you still have a good chance to recover your data.
IPS & Blocking unwanted extensions at gateway level.
First - Use Trend Micro
Second - Apply a Backup System similar to TIME MACHINE Apple.
www.cynet.com