For companies the worst-case scenario: a hacker is in the network and has encrypted sensitive data or
Stole passwords. Veritas corrects misconceptions about ransomware and
Ransom demands and offers tips on how businesses can protect themselves.
Ransomware is now part of everyday business life. The corona pandemic in particular offers criminals further opportunities for fraud. If hackers make it into the company network, they try to force ransom demands, sometimes up to six figures. Sascha Oehl, Technical Director DACH at Veritas, knows that companies often make wrong decisions in such a stressful sit
nation. He dispels five persistent myths about ransom demands and offers tips on how businesses can avoid ransomware attacks.
Myth 1: Paying the Ransom Helps
In the
worst case, data
theft can bring business to a standstill for days. Very
few can afford that. As a result, affected companies tend to pay the
ransom as soon as possible. However, as Oehl reports, the data can usually
not be restored even after paying a ransom. The company has to invest very
large sums of money again.
In addition to
the financial losses, the reputation is also damaged after a successful attack. This
may be followed by the loss of customers. Oehl warns that the solution
must never be to pay money to the blackmailers. Because this would
encourage the criminals to continue their activities.
Myth 2: Hackers Are only Interested in Victims Who Have Sensitive
Information
Regardless of
industry, position, or identity,
hackers primarily target employees. Their e-mail addresses, passwords,
bank accounts, but also encrypted databases are of interest. Veritas
reports that more and more small and medium-sized businesses are also falling
victim to hacking. Because their IT is usually less well protected and the
security systems are therefore easier to bypass than in large companies.
Myth 3: One Security System Is Enough
According to
Veritas, companies are adopting increasingly professional and up-to-date
security systems, but no system is infallible. Especially since the
attacks are becoming more and more sophisticated. Also, the
continued increase in remote work supports the cyber risk: Work devices are
located outside the protected company network, which creates more
vulnerabilities and potential gateways. Oehl, therefore, recommends training
employees on current phishing attacks
and developing effective data management and backup strategy.
Myth 4: Employees Cannot Be Effective Protection Against Ransom
Demands
The human factor
is crucial when it comes to IT security. Since employees are the preferred
target of hackers, they can also help build strong defenses. With regular
and sustained training for the entire workforce, they can become an early
warning system.
Myth 5: One Backup of The Data Is Enough to Restore It
According to Oehl, companies that have a backup system have already taken the first step to secure their data against ransomware. But that's not enough. Because the malware has spread in the network, the backup stored there is also affected. Veritas recommends off-site secured backups. To prevent the encryption of critical data by hackers, these should always be kept separate from the production system. Also, a combination of cold storage solutions, such as external or offline hard disk drives, and multifactor authentication can protect backups from system infections. Also, give a trial to our free antivirus for advanced protection.
Comments
Post a Comment