InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
Ransomware is an issue affecting organizations in all market verticals. Globally, there is a lack of qualified cybersecurity practitioners, and attackers realize this lack results in systems that are not hardened. Rather than attempting “traditional”
attacks, organized crime groups will implant attack code into victim organizations and indiscriminately encrypt systems and data. The decryption key or keys are then held for ransom. If an organization wants its data back, it must either find a way
to reverse the encryption process, restore systems from backup or pay the extortion demands.
Due to the prevalence of ransomware attacks, organizations all over the world have increased their backup readiness posture. In many instances, this allows well-prepared organizations to avoid paying ransom. In response, forward-thinking attack groups
have shifted tactics. In addition to standard ransomware encryption attacks, these groups are now stealing data and threatening the victim organization with public release of the data if the ransom demands are not met. Because of this, we are seeing
a renewed focus on data protection at rest and in transit.
Defending against this new level of ransomware attack requires a new level of focus on your backup program. Practitioners should consider:
Organizations are rethinking their data lifecycle to minimize the effects of newer data theft extortion methods. Some practices to consider are:
Good backups aren’t enough to counter the latest version of ransomware. To improve your chances of recovering without paying a ransom, consider:
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in
connection with such information, opinions, or advice.
August 11, 2022
By IANS Research
Gain a solid understanding of packet sniffing attack techniques and find best practices to detect and prevent your organization from falling victim to packet sniffing attacks.
August 9, 2022
By IANS Faculty
Overcome the challenges of SSO adoption by learning how to communicate the key benefits for end users across the organization.
August 4, 2022
Understand how the SOC audit and reporting process works and how it helps improve your businesses competitiveness. Also, learn how to determine when SOC reports are needed along with guidance to launch the SOC process.