Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Ransomware Part 3: Recommendations from the Trenches
In the first two parts of this blog series we explored both a high-level overview of dealing with the ransomware epidemic and an in-depth look at how different strains of ransomware can infect your network. In this post we examine actionable recommendations to protect your environment from ransomware threats.
Backups – It is critical for organizations to have a consistent, tested disaster recovery plan that includes solid backups.
Patch Flash and Java – Flash and Java are commonplace tools within corporate environments with several documented vulnerabilities.
Endpoint Monitoring – Tools that give a team visibility into the behavior occurring on the endpoint is tremendously useful in combating ransomware.
AppLocker and Software Restriction GPOs – A low-cost and effective way to restrict malware (not just ransomware) from running on systems is AppLocker and associated software restriction GPOs.
Email Filtering – Filtering extensions in email will stop a lot of malware attacks, including the Locky ransomware, in its tracks.
Cloud Access Security Broker (CASB) – CASBs are a helpful way to block traffic calling home to ransomware command and control servers.
Security Awareness Training – In the long run, it doesn’t matter what tools are implemented if a user is actively clicking on malicious attachments or taking actions that violate the acceptable use policy for a network.
At the end of the day, companies must understand their environments and the capabilities of their staff. The items covered in this post are very high-level recommendations, but should provide a starting point for protecting against ransomware.
Let us know what you need, and we will have an Optiv professional contact you shortly.