Monday, 30 January 2017

Some critical controls to secure and protect your environment from Ransomeware attacks

Below are some of the controls you can consider to protect your environment from Ransomeware attacks:
  • User Training
    • Identify phishing
      • Train your users to be able to identify phishing attacks
    • How to handle attachments
      • Block executable and compressed zip files
      • Train your users about Macros and risky files
  • Incident procedures
    • Be prepared and have an incident response plan for Ransomeware attacks
  • Protecting the PC
    • Blocking emails
      • Use security controls, email gateways, AVs, sandboxing, etc
    • Restriction on Group Policies and Firewalls
      • Block risky applications like Flash
      • Block Proxies like Tor
      • Block websites with low or no rating
      • Block download capability from low rating websites, bittorents, public file shares
  • Limiting User Rights
    • Do not allow privileged access to the workstations
    • Execute application whitelisting when possible
  • Revisiting Mapped Drives
    • Minimize user access to what is needed
  • Protecting the Server and Backups
    • Securing File Locations
      • Secure file shares, file servers, storages and the permissions on them
    • Backup Data
      • Backup data regularly and review and verify on regular bases
  • Integrity monitoring
    • Use File integrity monitoring solutions (FIM)

No comments:

Post a Comment