Ransomware attacks on enterprises of all sizes, across all industry sectors, are on the rise. From our frontline vantage point, conducting over 3,000 incident response engagements a year, we know that every organization can be a victim because a successful ransomware attack is within the reach of cybercriminals everywhere. From our frontline vantage point, we know that every organization can be a victim because a successful ransomware attack is within the reach of cybercriminals everywhere.
Some threat actors are meticulous planners. They deftly map out internal networks to identify core business functions and sensitive data storage, even going so far as to research a company’s financial results to gauge how much they can afford to pay. At the other end of the spectrum, creators of “ransomware-as-a-service,” who simply ask for a percentage of the ultimate ransom, have opened the door to another class of attackers to pursue attacks with minimal risks against a wider range of targets.
While completely preventing ransomware attacks is nearly impossible, security and risk management professionals can take proactive steps to neutralize or mitigate their harm. Basic cyber hygiene remains fundamental. First, that means taking the time to accurately and regularly document the entire configuration of your network.
When a local government was victimized by ransomware, it impacted the municipality’s police and fire dispatch systems, online utility payment system, centralized accounting system and many other critical segments on its network. Unfortunately, the IT director was unaware of how many servers were on the network. This lack of awareness delayed the initial remediation, especially when combined with limited viable backups for restoration.
– Matthew Dunn, Associate Managing Director, Cyber Risk.
Second, data mapping inventories are more important than ever. Starting last year, many ransomware actors threatened to release stolen data to pressure victims into paying ransoms. Almost overnight, ransomware attacks morphed from mainly expensive operational disruptions to crises fraught with regulatory data privacy and breach notification issues. Knowing what kind of data you have and everywhere it is collected, used and stored is imperative.
In Kroll’s experience, seven fundamental security steps can deliver immediate layers of protection from ransomware:
Kroll’s ransomware preparedness assessment aims to identify where your defenses are strong and where vulnerabilities exist that ransomware actors can exploit. Our methodology focuses on the cyber kill chain, a comprehensive examination that includes remote access configuration, phishing prevention, email and web protections, access controls and endpoint monitoring and end user awareness. At the end of our assessment, we will provide you with a prioritized, customized set of recommendations to help your organization deflect, detect or respond to a ransomware attack.
Kroll cyber experts will first focus on controls, processes and technology solutions to reduce the likelihood of ransomware-based attacks. During this step, we will:
Kroll will conduct up to four remote interviews with technical teams to assess the secondary defensive measures in place to protect the organization against email-based attacks. This review will encompass:
In Kroll’s experience, ransomware protection starts with fundamental security practices bolstered by customized strategies informed by what we are seeing on the frontline. With Kroll’s help, your organization can build smarter defenses, close exploitable gaps, better safeguard sensitive data and more quickly respond and recover from an attack. Call Kroll today for your customized ransomware protection assessment.
Incident response, digital forensics, breach notification, security strategy, managed security services, discovery solutions, security transformation.
Kroll’s Virtual CISO (vCISO) services help executives, security and technology teams safeguard information assets while supporting business operations with augmented cyber expertise to reduce business risk, signal commitment to data security and enhance overall security posture.
Whether responding to an investigatory matter, forensic discovery demand, or information security incident, Kroll’s forensic engineers have extensive experience providing litigation support and global eDiscovery services to help clients win cases and mitigate losses.
Kroll's data privacy team provide DPO consultancy services to help you become and stay compliant with regulatory mandates.
Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.
Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.
Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.
Kroll’s data breach notification, call centers and monitoring team brings global breach response expertise to efficiently manage regulatory and reputational needs.
by Laurie Iacono, George Glass, Keith Wojcieszek
by George Glass, Ryan Hicks
by Tiernan Connolly, Chris Palmadesso
by Keith Wojcieszek, Laurie Iacono, George Glass