37% of Organisations Were Victim of Ransomware In 2021

Business
IT
News
Security

_audit

Optimize your IT with a free audit

Start with a free IT audit. We’ll review your costs, cybersecurity, and support to uncover ways to cut expenses, boost security, and drive productivity. Book your audit today!

Book IT Audit
January 20, 2022

37% of Orgs Said They Were the Victim of Ransomware In 2021

While ransomware has become increasingly common, less than 10% of the companies victimised claimed to lose money. That's a good thing, as it indicates that while ransomware attacks may be on the rise, it also illustrates that businesses have headed the warnings and are taking the precautions that are necessary to protect themselves.So, what types of things are companies doing to protect their files and sensitive data from becoming encrypted and having to pay a ransom to the hacker to receive the decryption key? Here's a look at some of the simple, yet highly effective strategies that business owners have put into place ' and that you can try using, too!

Develop and Implement Training and Awareness Program

Developing and implementing programs that are designed to bring awareness to and train end users is an absolute must. Since end users are the most common targets of ransomware attacks, making sure that employees are aware of the threats of these malicious attacks, how these attacks are delivered, and how to identify them, is an absolute must. After all, you can't very well protect your business if your employees aren't aware of the dangers. You can find out more about our cyber awareness training here.

Enable Powerful Spam Filters

In order to block out phishing emails (attempts that are made by malicious entities in order to obtain sensitive information via email) from making their way to employees and authenticate emails that are coming into inboxes, implement technologies like Domain Message Authentication Reporting and Conformance (DMARC), Sender Policy Framework (SPF), and DomainKeys Identified Mail (DKIM).' These technologies are great, as they are highly effective at preventing email spoofing.

Be Diligent with Emails

Make sure that you ' and that all of your employees ' take care to scan all messages that come into inboxes. It's also important to check outgoing emails to see if you spot any threats that may have been attached completely unbeknownst to you. Filter executable files that are utilized to perform various functions on computers so that they won't be able to reach employees.

Create Firewalls (and put them in place)

Take the time to configure firewalls that will block any access to IP addresses that are known to have malicious intent. This simple tip can be a real lifesaver.

Scan for Viruses and Malware Regularly

Be sure to set up anti-virus and anti-malware programs. Set these programs up so that they execute scans on devices in programs (email, etc.) on a regular basis ' and that they check your programs on a regular basis.

Manage Privileged Account Use

It's also a good idea to manage privileged account that is based on the least privilege. For example, you should not assign any administrative access to any employee, unless doing so is absolutely essential. If it is necessary, employees who are assigned administrator accounts must be instructed to use them only when doing so is absolutely vital.

Configure Access Controls

This includes directory, file, and network share permissions, and the configuration should (again) be done with the least privileged in mind. For example, if it's only necessary for an employee to access and read certain files, he or she should not be granted write access to the files, shares, or directories.If you would like to find out more or how we can help you put the above measures in place then get in touch with us today.

_news

Related Blogs

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

AI
News
Virtual Desktop
Outsourcing
Software
Security
Office 365
Science
Jobs
IT
Computer
General
Future
Business
Blog
Backup

Book a free consultation

Discover more Topics

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

_services

Managed IT Services

Think of us as your tech partner who’s always got your back. Our Managed IT Services keep things running smoothly, prevent problems before they happen, and make sure your tech is working to help your business grow.

Learn more

Security

Cyber threats keeping you up at night? We get it. Our security services are designed to protect your data and keep you safe, so you can focus on growing your business without the constant worry.

Learn more

Hosted Solutions

Need flexibility to scale? Our Hosted Solutions make it easy. From cloud desktops to data management, we help you streamline, save on costs, and stay productive—without missing a beat as you grow.

Learn more

Voice, Data & Hardware

Communication should be easy, right? With our Voice, Data, and Hardware solutions, we make sure your team stays connected and productive. Whether it’s phones, internet, or cables, we’ll set you up for success.

Learn more