CISO Guide To Ransomware Prevention Ebook
CISO Guide To Ransomware Prevention Ebook
Guide to
Ransomware
Prevention
THE CISO'S GUIDE TO RANSOMWARE PREVENTION | 2
TABLE OF CONTENTS
Introduction.................................................................................................................. 3
Dynamic trends..............................................................................................................5
Prevention.................................................................................................................... 7
Defense........................................................................................................................ 9
Case study.................................................................................................................... 10
2
THE CISO'S GUIDEZero
Stopping TO RANSOMWARE PREVENTION
Days at the Speed | 3
of Digital
INTRODUCTION
Ransomware attacks have transformed the cyber attack landscape. These sophisticated and persistent threats
can rapidly shut down computers, stop business operations, destabilize economies, and limit access to goods and
services in minutes.
Top ransomware attack targets include organizations in the financial services, healthcare, technology, manufacturing
and construction spaces, although many ransomware attackers have proven indiscriminate in choice of targets.
Cyber crime gangs probe vulnerabilities within an organization, determine how to create chaos, and disruption, and
then plan for profiteering. Some hackers opt for a “smash n’ grab” approach, while others lurk quietly in systems for
months in order to maximize levels of disruption and financial gain.
While the total cost of ransomware and ransoms continue to trend upwards, ransomware attacks need not be a
routine business expense or included in the cost of operating a business.
With higher levels of cyber security maturity, organizations can develop more resilient environments.
1
Cost of a Data Breach Report 2021, IBM
2
Ransomware: A Constant Threat, Kirk Hayes, Infosecurity Magazine, Feb 21, 2022
3
THE CISO'S GUIDE TO RANSOMWARE PREVENTION | 4
Healthcare
Healthcare organizations are another favorite among ransomware attackers. Across the past few years, medical groups in the
US, Australia, and elsewhere have contended with devastating ransomware attacks. Attacks have led to the compromise of
patient data; from social security numbers, to personal health record information.
At least one medical organization decided to permanently close its doors after failing to recover ransomed data. As the cyber risk
to the healthcare sector expands on account of the geopolitical climate, efforts to protect hospitals, health clinics, employees and
patients must increase.
Why financial services and healthcare organizations? Millions of dollars in the bank and/or valuable data = high profits.
3 Banking Industry Sees 1381% Increase in Ransomware Attacks in 2021, Maria Henriquez, Security, September 20, 2021
THE CISO'S GUIDE TO RANSOMWARE PREVENTION | 5
The Ransomware-as-a-Service affiliate who conducted the attack clearly intended to propagate the ransomware to Kaseya’s
MSP customers. Once the ransomware attack blighted Kaseya, it also immediately affected at least 1,000 additional enterprises.
A $70 million ransom payment (in Bitcoin) was requested in order to compensate for all organizations’ victimization.4
As the aforementioned example shows, MSPs and MSSPs may be at elevated risk of ransomware attacks. They represent easy
conduits for attacks, with a potential for downstream effects and corresponding increases in profits.
Experts contend that MSPs and MSSPs often fail to take the threat of ransomware seriously. Those that retain sophisticated,
strong cyber security infrastructure may be able to weather the storm.
Given the increased incidence of ransomware attacks on service providers, organizations should take the opportunity to pursue
stronger security.
PREVENTION
To prevent ransomware attack damage, implement these cyber hygiene habits and best practices:
1 Provide employees with cyber security awareness training. Many ransomware attacks start with a convincing phishing
email sent to an employees’ inbox.
2 Develop stronger user authentication methodologies; these include multi-factor authentication and password policies.
3 Ensure that your organization retains usable backups of all critical data, databases, key applications, and servers in
non-networked locations.
6 Regularly update and patch software. Organizations have needlessly suffered security incidents due to patching oversights.
7 Deploy proven, effective threat detection tools. Opt for automated threat detection, which can increase advanced attack
identification capabilities.
8 Filter most threats out of systems before they can cause harm by using automated email security and endpoint security tools.
10 Stay up-to-date regarding the latest security threats through vendor-sponsored blogs, like CyberTalk.org.
THE CISO'S GUIDE TO RANSOMWARE PREVENTION | 8
DEFENSE
In the event that a ransomware attack hits your organization, here’s how to respond:
1 Contain the breach. Mitigate damage efficiently and avoid allowing the attack to worsen.
3 Ensure that all traces of the ransomware/malware are removed from your system.
4 Scan backups to check for malware. If no threats are found, attempt to restore data from backups.
5 Contact internal IT administrators and executives who should know about the attack.
7 Avoid paying ransom extortion fees. Decryption tools are not guaranteed to work and hackers can still choose to leak data.
8 Regardless of whether or not you maintain a cyber insurance policy, contact your business insurance group.
9 Appropriate departments to notify clients other business relations who may have been negatively affected by the breach.
10 Reach out to your cyber security vendor, which may be able to offer further insights into your specific ransomware
experience.
THE CISO'S GUIDE TO RANSOMWARE PREVENTION | 10
SOLUTIONS
Specific solution types that can help…
1 Prevention-focused solutions that leverage AI within a multi-layered security architecture are best.
2 An intelligent, consolidated ransomware prevention architecture can prevent known and zero-day attacks.
3 Consider purchasing anti-ransomware tools that are part of a larger cyber security solutions package.
4 Seek out cyber security solutions that offer a high ROI and low TCO.
IN CONCLUSION:
Ransomware threats can easily undermine enterprises. The threat persists across industries and across geographic locales.
Roughly hewn cyber security architectures are not tough enough to combat next generation threats. The best approach to fighting
off ransomware starts with prevention. While there are never any guarantees, with a strategic cyber security roadmap, it is
possible to win the fight. For further expert insights into the ever-changing ransomware threat landscape, visit Cyber Talk.
Worldwide Headquarters
5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: info@checkpoint.com
U.S. Headquarters
959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233
www.checkpoint.com
© 2022 Check Point Software Technologies Ltd. All rights reserved.