4 Essentials for Protecting Against Ransomware
Knowing how a ransomware attack works can be the difference between the organisation falling victim to an attack, and detecting and acting on suspicious activity before attacks happen.
Ransomware is a devious type of software designed to extort money from the user by encrypting data, thus making it inaccessible, and demanding payment for the ‘service’ of decryption.
As a prevalent form of cyber threat, ransomware can completely impede an organisation from operating, for example, in the case of the recent Travelex attack which left the company unable to properly function for weeks.
To learn more about how a ransomware attack works, read on.
Attack on your Information
With many ransomware attacks originating from phishing, users frequently infect computers through the opening of an attachment or through following a deceptive link.
How a ransomware attack works, is once downloaded, the malware will quickly lock away your data behind a paywall, demanding potentially extremely large sums of money in exchange for the possibility of returning access to your data.
As with many cybercrime related exchanges, the ransom is to be paid in a difficult to trace cryptocurrency. This digital currency is purchased by the user, then transferred to the hacker’s ‘wallet’ – an anonymously controlled, online account.
Even if a ransom is not payed, ransomware can be extremely costly to deal with. It is estimated that the WannaCry virus cost the UK’s NHS around £92 million in direct expense and lost output, as well as endangering patients’ lives in the process.
Big Costs and Ransom Payment
Unsurprisingly, even payment does not guarantee decryption and the UK’s Action Fraud recommends non-payment. Research also suggests that organisations that choose to pay a ransom, on average end up spending twice as much in recovery costs, as organisations that do.
Once a system is infected and data has been encrypted, an affected organisation will likely be facing significant costs in recovery; although by taking the proper precautions to protect against a ransomware attack, an organisation may avoid any loss at all.
4 Ways of Protecting your Organisation from a Ransomware Attack
Knowing how a ransomware attack works is crucial for the detection of potential issues before they occur. The first line of defence against any kind of cyber attack is avoidance, and there a plenty of ways to initially protect yourself and minimise the likelihood of being the victim of a data ransom attack.
A strong anti-virus software is an essential. Many computers will come with this kind of software already installed, though it is worth taking the time to check just how protected you are.
There is plenty of free anti-virus software out there, however for organisations, this kind of protection likely is not enough and if you are dealing with large quantities of sensitive information, upon which your organisation relies, a more robust solution is recommended.
We must also consider the origin of these attacks. As previously noted, nearly all ransomware infiltrates a system via email phishing. As an individual, or as a member of an organisation, you must remain vigilant to the threat that a simple attachment can pose.
To find out more about spotting phishing attacks check out our blog: 4 Ways of Recognising Phishing Attacks.
Ransomware relies on two fundamental assumptions. Firstly, that the software will infect someone’s computer, and secondly that the data being held to ransom is only accessible via the infected device.
Should the data be adequately backed up, an organisation can perform a system restore. Essentially allowing an organisation to negate the loss of accessibility caused by the ransomware attack and avoid unnecessary loss in output, or incurred costs.
Most computers and devices offer the option of cloud-based backups as well as system restore points. Each of these practices offers a partial solution to the potential problem of ransomware.
One of the major reasons the NHS was susceptible to the WannaCry ransomware attack, was that many of the computers being used were running out-of-date operating systems. These weaker systems were not protected in the same way as a current OS, and therefore the door was left open to cyber criminals.
As with operating systems, we must also ensure that the software (especially the anti-virus) we are using is the very latest. New vulnerabilities are discovered every day and developers work hard to ensure these issues are patched and fixed, although if we’re not making these updates, we leave ourselves susceptible to attack.
Information Security Awareness Training
Ransomware, like many forms of information security attacks, relies on a human element for success. As noted, phishing is invariably involved in all kinds of compromises, and though there are plenty of technological solutions that will help protect your information, this alone will be ignoring an important factor.
By educating your staff regularly with interactive and knowledge-demonstrating tutorials, you do not just help to improve compliance, but also reliably reduce the risks of human errors and improve the standards of awareness.
Comprehensive information security awareness training should inform and educate staff about their role in front-line defence against security threats. Alongside regular back-ups, frequent updates and basic avoidance techniques, effective information security awareness training offers you and your organisation the best protection against ransomware and similar threats.
Hut Six Information Security Awareness Training
Featuring twenty-six comprehensive tutorials covering all aspects of information and cyber security, Hut Six’s training is focused on demonstrating learning outcomes. With Hut Six’s learning management system (LMS), employers can assess and track the achievements of staff and better understand areas for improvement.
Hut Six’s comprehensive solution builds a security aware culture by focusing on achieving meaningful behavioural change. With engaging training, your organisation’s defences are strengthened against malicious actors, reputational damage and potential fines and losses, whilst satisfying compliance obligations.
Security Awareness for your Organisation
Enjoyed our blog? Learn more about how Hut Six can help improve you security awareness with training and simulated phishing. Start a free trial now, or book a meeting with one of our experts.
Hut Six Staff Snippets: Handling Sensitive Information - Hut Six
Luke talks about his favourite Information Security tutorial, Handling Sensitive Information. Information Security video by Hut Six Security.
4 Ways of Recognising Phishing Attacks in 2020
Ways of recognising phishing attacks to ensure your organisation stays secure. Blog by information security awareness training provider Hut Six Security.
What are the Eight Principles of the Data Protection Act?
What are the Eight Principles of the Data Protection Act? Why has this changed to seven in the DPA 2018? Blog by Hut Six Security.
Hut Six Staff Snippets: Encouraging a Secure Culture - Hut Six
Kayleigh talks about her favourite Information Security tutorial, Encouraging a Secure Culture, which explains the importance of building a secure culture.
The Age of Remote Work
4 Key Information Security Risks for remote work during lockdown. Blog from Information Security Awareness training provider Hut Six Security.
Top 10 Essential Security Awareness Training Topics - Hut Six
Top Cyber Security Awareness Training Topics · Phishing · Web Safety · Passwords · Malware · Mobile Devices · Wi-Fi · Social Engineering · Encryption · Backups · Sensitive Information.
Who is Responsible for Enforcing the Data Protection Act?
Who is Responsible for Enforcing the Data Protection Act? Information security awareness blog by Information Security training provider Hut Six Security
Hut Six Staff Snippets: Social Media and Privacy - Hut Six
Priya, our Customer Success Specialist, talks about her favourite tutorial, Social Media & Privacy, which explains the dangers of social media sites and how to stay safe.
Are There Any Exemptions to the Data Protection Act?
Are there any exemptions to the Dta Protection Act? Blog by Information Security Awareness Training provider Hut Six Security.
Hut Six Staff Snippets: Assessing your Risk - Hut Six
Simon Fraser, our Managing Director, talks about his favourite tutorial, Assessing your Risk, which explains how businesses can assess the likelihood of a security risk occurring