How Do You Manage Ransomware Risk?

Sep 16, 2021 12:15:00 PM |

Mike Skinner

Social Share:

Ransomware Blog_v2Ransomware has become an all-too-common occurrence in today's digital world. With threat actors constantly evolving their tactics and developing new threats, protecting your organization against ransomware attacks can be difficult. However, following these 5 best practices can minimize your risk:

  1. Use strong passwords and don't reuse them across different accounts or services. Remember that complex and unique passphrases are more secure than short and simple passwords. Consider using quotes, lyrics, or phrases for longer, more secure passwords that are easy to remember. 
  2. Utilize two-factor authentication tools whenever possible. These are simple to use and adds a layer of security to your account. While a malicious algorithm may quickly uncover most usernames and passwords, two-factor authentication offers an extra layer of protection for your data.  
  3. Do not click on unsolicited emails. Ransomware is often distributed through phishing emails with infected attachments. Do not open any files you did not expect to receive and double-check the sender's email address before opening an email attachment or clicking.  
  4. Update to the latest software on all devices, including computers, mobile phones, and tablets. Software updates typically include new security defenses in the form of patches. These patches are released to better protect your device and data from vulnerabilities that could be exploited. Install or enable additional security systems on every computer, like anti-malware programs and auto-updates, to keep your devices from being left open to software vulnerabilities.
  5. Back up your data regularly so that you have a copy on hand if needed. A best practice is to keep three organized copies of your data on at least two separate storage solutions and store one of the copies on a remote server such as the Cloud for easy data recovery.

Following these cybersecurity best practices can help you minimize the risk of ransomware infection and limit the damage of a successful attack.  

 

 

COMMENTS

THIS POST WAS WRITTEN BY Mike Skinner

Mike is the partner in charge for HORNE Cyber. His primary focus is to enable clients to fully leverage technology innovations by providing the insights critical to safeguarding their business, customers’ critical data and brand reputation. He is responsible for information technology audit, regulatory compliance, information security consulting, internal control consulting and business solution implementation.

Find me on: