Ransomware: What you don’t know
DAILY RISK ESCALATING
IBM Security X-Force saw a rapid increase in victims of ransomware, commonly delivered via an unsolicited email as an attachment.
Knowing the incidents you are most likely to encounter based on operating sector, systems in use and applicable key risk indicators is critical.
DEFENSE AS A GREAT OFFENSE
Proactive end-user education is key; a well-developed and rehearsed incident response plan can save time and money.
ATTACKS COME IN ALL FORMS
Discovering ransomware infection can vary, from being unable to access specific files or services to receiving a ransom note.
ANALYZING THE INCIDENT
It is essential to identify the ransomware variant and determine how it entered the organization to better fight it and prevent the spread.
Using an endpoint detection and response solution can aid early detection, allowing infected devices to maintain power and retain data.
FIND, CONTAIN AND ELIMINATE THREATS
Staff must identify all infected resources, disable and disconnect them, remove ransomware and rebuild systems with a trusted source.
RECOVERING FROM AN ATTACK
Afterwards, organizations must patch vulnerabilities to prevent re-exploitation and restore data using internal backup infrastructure.
IBM SECURITY X-FORCE RESOURCES
To learn how to protect your organization, download the complete guide.