These are some of the names that hit the headlines, but there are many more. While the names are useful in tracking down the exact behavior, largely it doesn’t matter. They all cause damage to data and systems. Criminals are making huge amounts of money from them, and they are becoming easier to create. The chances of getting hit by these threats have gotten to be extremely high.
Defense against these threats is possible, but most companies are not taking the necessary precautions. Paying the ransom is not an ideal solution since there is no guarantee the attacker will keep up his side of the deal.
- Virus scanners managed by a central console.
- Backups to restore files rather than paying the ransom
- Education. Many infections are caused by users clicking on links or using software or services they shouldn’t.
- Security compliance. Preventative actions significantly reduce the chances of an incident.
- Audits. The regular IT administrators often miss issues. Sometimes this is due to lack of training, assumptions about the condition of systems they work on every day, or unfortunately a disregard for security standards or the work required to maintain them. Fresh eye will often catch issues that were missed.
- Frequent updates to patch vulnerabilities
- infrastructure scans.