How Businesses Should Respond to the Ransomware Surge

  /     /     /  
Publicated : 22/11/2024   Category : security


How Businesses Should Respond to the Ransomware Surge


Modern endpoint security tools and incident response plans will be key in the fight against ransomware.



The global rise of ransomware has businesses taking a closer look at their protective tools.
More than one-third (35%) of security pros in Dark Readings
The State of Ransomware
survey detected ransomware on their systems in the past year. Only 27% say modern antimalware tools are very effective in stopping ransomware; 56% think they are somewhat effective.
Half of IT practitioners believe it will be harder to prevent ransomware from infecting their systems two years from now, researchers found. This begs the question: what are security vendors doing to improve the effectiveness of their systems, and which should businesses use?
Because ransomware is high-profile, its an opportunity for practitioners to be proactive and have a discussion about response and upgrading defenses, says Mike Rothman, analyst and president at Securosis. They go after everybody, and everybody can pay ransom.
Advancing endpoint security
One of the things we see businesses doing is turning to their messaging security provider first for answers and solutions, says Rob Westervelt, research manager within IDCs security products group. Thats blocking it before it even gets to the end user, which ultimately is best as opposed to having the end user click a malicious attachment or malicious URL.
When attackers bypass messaging filters and employees start clicking malicious attachments that made it into their inboxes, it becomes an endpoint security problem. While he doesnt see many companies building new products to specifically protect against ransomware, Westervelt says there is more messaging from vendors about their ransomware capabilities. Some have begun to add new bells and whistles to monitor strange system behavior.
You have to advance your endpoint protection, says Rothman. If youre dealing with a system from 2013, you dont really stand much of a chance against the attacks that are happening today.
Most endpoint vendors, both traditional antivirus and disruptive startups like Cylance, can monitor for abnormal activity like signs of files being encrypted quickly. Some tools, like Sophos Intercept X, has technology that can roll back encryption, Westervelt explains. Some solutions, instead of simply alerting to an attack, quarantine a system to ensure it doesnt spread.
Everyone in endpoint protection is starting to add file monitoring as a new capability in their system, says Rothman. Looking for anomalous file activity on the endpoint and stopping that … when folks start accessing files that havent been accessed in a long time, something funky is going on.
Westervelt points to the growth of companies with a stronger focus on file access monitoring. Varonis, for example, solely focuses on data access. Its not so much about looking for malware as it is about monitoring files for abnormal activity. CyberArk, another, focuses on privileged account security. Its not standard AV, he says, but it looks for ransomware behavior.
In addition to monitoring for anomalous file activity, Rothman also advises ensuring you have strong exploit protection and the ability to fight fileless attacks; those that dont use the file system but store the encrypted payload in the registry.
Its about making sure youre using modern defenses to deal with modern attacks, he continues. A lot of technology out there is not modern defense.
The problem with additional ransomware protection is the heightened risk of false positives, Westervelt says. A system may start to flag employees who do a lot of encryption and file changes as part of their job, and block behavior that is abnormal but still valid.
It only takes one false positive, one disruption of an important business deal to cause the CISO to lose their job, he notes.
Preparing a response plan
Regardless of the level of your technical control, Rothman emphasizes the importance of developing a response plan. Many companies dont have a plan, particularly midmarket organizations that pay little attention to security.
They have to have that initial conversation about what to do if their machines get locked up, he explains. When your machines are mostly encrypted and showing the Pay Us screen, thats not the time to be figuring this stuff out.
Rothman advises businesses to work through their response processes and what their tolerance would be for a certain set of scenarios. When those are decided, its time to practice.
Practice identifies the holes and gaps in your process, he explains. The only way to figure out what works and what doesnt work is to actually do it … some organizations use tabletop exercises. I cant recommend that enough.
Related Content:
Ransomware Will Target Backups: 4 Ways to Protect Your Data
New Standards Will Shore up Internet Router Security
Less Than Half of Consumers Take Protective Steps Post-Breach
70% of US Employees Lack Security and Privacy Awareness
Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity
agenda here
.

Last News

▸ CryptoWall is more widespread but less lucrative than CryptoLocker. ◂
Discovered: 23/12/2024
Category: security

▸ Feds probe cyber breaches at JPMorgan, other banks. ◂
Discovered: 23/12/2024
Category: security

▸ Security Problem Growing for Dairy Queen, UPS & Retailers, Back off ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
How Businesses Should Respond to the Ransomware Surge