Ransomware: What you  don’t know

DAILY RISK ESCALATING

IBM Security X-Force saw a rapid increase in victims of ransomware, commonly delivered via an unsolicited email as an attachment.

IDENTIFYING VULNERABILITIES

Knowing the incidents you are most likely to encounter based on operating sector, systems in use and applicable key risk indicators is critical.

DEFENSE AS A  GREAT OFFENSE

Proactive end-user education is key;  a well-developed and rehearsed incident response plan can save time and money.

ATTACKS COME  IN ALL FORMS

Discovering ransomware infection  can vary, from being unable to access specific files or services to receiving  a ransom note.

ANALYZING THE INCIDENT

It is essential to identify the ransomware variant and determine how it entered the organization to better fight it and prevent the spread.

Using an endpoint detection and response solution can aid early detection, allowing infected devices to maintain power and retain data.

FIND, CONTAIN AND ELIMINATE THREATS

Staff must identify all infected resources, disable and disconnect them, remove ransomware and rebuild systems with a trusted source.

RECOVERING  FROM AN ATTACK

Afterwards, organizations must  patch vulnerabilities to prevent re-exploitation and restore data using internal backup infrastructure.

IBM SECURITY X-FORCE RESOURCES

To learn how to protect your organization, download the complete guide.