How can companies best combat the threats of ransomware?
Ransomware casts a long shadow across today’s digital landscape, threatening companies of all sizes with data paralysis, operational disruptions, reputational damage, and dire financial consequences. The problem is especially serious for mid-market organizations, with more than half (57%) admitting that they do not regularly audit and replace outdated systems, and a similar number (57%) fail to patch their systems regularly.
These security holes create a larger attack surface and additional vulnerabilities that cybercriminals are eager to exploit. Fortunately, with a better understanding of ransomware and proactive cybersecurity measures, businesses can significantly strengthen their defenses and reduce the overall risk of data loss.
How does ransomware work?
Ransomware is a malicious software program designed to encrypt a victim’s critical data, essentially locking them out of their own files. Attackers will demand a ransom in exchange for the decryption key, creating a huge dilemma for businesses. Pay the ransom and risk encouraging cybercriminals, or lose access to vital data, halting operations, exposing customers to unnecessary risk, and causing significant regulatory and financial problems.
There are several methods that attackers can use in an attempt to gain access to a victim’s network. Phishing, and the rise of spear phishing, appears to be targeting employees with emails containing suspicious attachments or links that, when clicked, can ultimately download malware to a device. It is reported that 91% of all cyber attacks start with a phishing email, and 32% of all successful breaches use phishing techniques. Exploiting known software vulnerabilities and exploiting trust attacks are additional methods used by attackers to gain access to corporate systems. In addition, ransomware operators will also try to identify your backup solutions and delete or encrypt them to ensure that companies cannot quickly restore and thus avoid paying the ransom.
Product Director of Security and Compliance, Advania.
The evolving threat landscape: new tactics and targets
The cybersecurity threat landscape is constantly evolving. In 2024, companies and individuals alike must be aware of new and emerging threats, including the risks posed by new ransomware groups. Drawn by the lucrative nature of ransomware, these groups are looking for innovative ways to access the systems critical to maintaining day-to-day business operations.
This lucrative nature can be illustrated by recent data showing that payments from ransomware victims exceeded $1 billion last year – an all-time high. And that’s just for the cryptocurrency portfolios that forensic analysts were able to track. While authorities work together to take out the most productive groups (such as the recent LockBit takedown), these victories are often temporary, with new operators quickly filling the void.
Moreover, attackers change tactics. While data encryption remains a common method, some ransomware variants are now stealing data and threatening to expose it on the dark web, creating a double extortion threat. Malicious QR codes, a new variant called ‘Quishing’, are emerging as another potential entry point. Due to the changing tactics, user vigilance is of utmost importance.
The focus is also shifting to smaller companies. BlackCat and Lockbit are two ransomware groups that specifically target SMBs, especially in growing economies. SMEs often lack the dedicated resources for robust cybersecurity, making them more vulnerable.
Building a Fortified Defense: Strategies for Businesses of All Sizes
While there is no surefire way to completely prevent ransomware attacks, businesses can take proactive steps to significantly reduce their risk and limit the impact if an attack occurs. Cloud security solutions can be a powerful ally in this battle.
Building a strong defense against ransomware requires a layered approach. The cornerstone of this defense is a robust backup strategy. Regularly backing up critical data to a secure, off-site location, ideally managed by security professionals in the cloud, provides a safety net in the event of an attack. Cloud backups are geographically separated from local infrastructure and provide an additional layer of protection against ransomware that targets local systems. However, backups are only useful if they function correctly. Regularly testing and training your team in the recovery process will ensure a quick recovery if a ransomware attack disrupts your operations.
In addition to backups, minimizing your attack surface is crucial. This involves security hygiene practices that reduce potential entry points for attackers. Educating employees through regular security awareness training can help them identify phishing attempts, a common tactic for deploying ransomware. IBM’s ‘Cost of a Data Breach’ report shows that employee training is a highly effective tool against data breaches, saving organizations at least $232,867 per attack.
Regularly assessing and tightening access controls to applications, networks, systems and data helps minimize potential damage. The principle of least privilege should be followed, granting users only the access they need to perform their tasks. Taking advantage of built-in security features on devices and operating systems, such as firewalls, malware detection and automatic updates, further strengthens your defenses. Reputable cybersecurity resources can provide easily digestible, jargon-free guidance for establishing best practices for different systems. By implementing these measures, companies can significantly reduce their vulnerability to ransomware attacks.
The role of the cloud in the fight against ransomware
Cloud security services provide additional layers of defense against ransomware. These services can continuously monitor your network activity for suspicious behavior and act as a vigilant guardian that uses the power of cloud infrastructure to identify and block potential threats before they can cause damage. Additionally, cloud providers typically encrypt your data both at rest and in transit, adding an additional shield against unauthorized access. Disaster recovery services offered by cloud providers can also ensure business continuity by minimizing downtime in the event of an attack. Finally, segmenting your network based on zero trust principles acts as a series of walls within your digital castle, containing a ransomware attack on the specific affected segment and preventing it from spreading across your entire network.
By understanding how these attacks work and taking a proactive approach, you can significantly strengthen your defenses. Regular backups, preferably stored securely in the cloud, are the cornerstone of any ransomware defense strategy. Cloud solutions offer additional benefits such as continuous monitoring, data encryption and disaster recovery capabilities.
However, defense goes beyond technology. Implementing security hygiene practices, such as employee training and strong access controls, significantly reduces your attack surface. Using built-in security features and multi-factor authentication further strengthens your posture. Keep in mind that ransomware is constantly evolving, so it’s crucial that you stay up to date on the latest threats and update your defenses regularly. By taking these simple steps, you can transform your business from a vulnerable target to being prepared for and mitigating ransomware attacks.
We have the best cloud antivirus.
This article was produced as part of Ny BreakingPro’s Expert Insights channel, where we profile the best and brightest minds in today’s technology industry. The views expressed here are those of the author and are not necessarily those of Ny BreakingPro or Future plc. If you are interested in contributing, you can read more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro