Most ransomware prevention advice focuses on antivirus software and other defenses, such as having good detection and response (DR) mechanisms. All of these are important. But with the advanced level of ransomware today, you also need to take measures that test your defenses and DR strategies to ensure the measures you have in place will hold up to a real-life advanced attack.
A restaurant wouldn’t serve a recipe without testing it. Automobile manufacturers wouldn’t sell a car without crash testing it. And companies responsible for safeguarding sensitive and legally protected personal information (or intellectual property, proprietary data or business-critical assets) shouldn’t stake their reputation on security defenses that they haven’t tested either.
The bottom line is, you don’t know what you don’t know. Testing your defenses with simulated attacks and targeted exploits increases the likelihood that you’ll uncover weak spots you didn’t know you had. Find those issues before attackers find them for you. Cover your bases. Protect your reputation, position, and compliance standing – not to mention all that sensitive information – and make it a habit to test every new security strategy you implement.
An offensive security program (vulnerability management, penetration testing, red teaming) should be engaged on a regular basis. Vulnerability management solutions are typically automated, allowing organizations ongoing visibility. But this should always be paired with pen testing and red team engagements that are performed on a regular basis. Every quarter is optimal, every half is acceptable, every year is mandatory – and maybe a little too late, given the rapid evolution of ransomware today.
Ransomware is an ever-evolving craft and one that threat actors are not getting tired of anytime soon. Now, thanks to advancements in artificial intelligence, a whole new world of creative ransomware endeavors has opened, and organizations need new tools, systems, and commitment to deal with it – and a lot of other negative changes. Here are some:
Plus, crucial industries like healthcare, energy, and the public sector at large are also increasingly at risk.
Ransomware attacks are increasing in size and scope, as well as the potential to damage critical areas, especially in sectors where digitization is still comparatively new or disjointed (healthcare, education, local municipalities, and small utilities). These sectors are tantalizing targets for attackers who know that their defenses are often not fully matured, and so battle-testing them becomes more important than ever.
Thankfully, testing your network’s security defenses doesn’t need to be hard, no matter your skill level. Fortra has managed options and advanced technologies that empower your team to execute vulnerability scanning, penetration testing, and red teaming.
We know that we’re in the midst of an ongoing cyber talent crisis (and probably will be for a while), so we’ve adapted our solutions to meet SOCs where they are.
Preparing for a ransomware attack is a two-part process. Yes, you need quality antivirus solutions and network detection and response tools in place. But you also have to make sure they all come together and work under pressure, that your team runs the right fire drills, and that your whole security strategy – solutions and SOC – is always prepared, because you never know when and how ransomware could strike.