Tips on how to avoid the Ransomware attacks

Here are some tips on how to avoid the Ransom ware attacks that hit several high profile places recently:

First make sure you have Current signatures on your Firewall: Fundamentally, you need to make sure all security updates to your firewall are on it, immediately!. Next Move to your computers and make sure that all the security updates have been done on them. 

NOTE: If you don’t have a Next-gen class firewall, such as a Sonicwall, I would strongly recommend you to look into getting one. The firewall functionality that these provide over a Linksys, TP-Link, Asus, Netgear, etc is significant and frankly it was the only firewall that fully protected against the recent Wannacry attack.

You can also use Cloud-based sandboxing and Deep packet inspection for further protection. Both of these features are able to be implemented, if needed, on the Sonicwall devices I recommended. 

Since over half of malware today is encrypted, you need a solution that can decrypt that hidden traffic for security analysis. Deep packet inspection of SSL/TLS (DPI-SSL) is a crucial requirement for any next generation firewall.

Email security: Also, in order to block attacks from malicious emails, you will want to ensure that all of your email security services are up to date. Since 65% of all ransomware attacks happen through phishing emails, this also needs to be a core security element.

Make sure you have Recoverable backups: Actively maintain and test backups of core network systems, applications and data as a worst-case contingency measure. Never ever depend on one backup method. Always have multiple on different technologies for your backups.  I have personally seen cloud recover take an entire week to restore a file server.  Understand your pain points and how much you can afford to lose in time and your data.  Certainly talk to an IT professional who can help you wade through the options for protection.

Last but certainly not least - Education: A key element of avoiding ransomware is continually training employees to spot suspicious email and file attachments. Criminals depend upon spoofing end-users into taking actions that lead to breaches. Forewarned is forearmed. 

Feel free to call me at 585-343-2713, I am glad to spend time to understand your needs and explain in detail what would be the best path for you. 

I hope this helps protect yourself and your business.


Paul Marchese

CNE, CTNE, ASP

要查看或添加评论,请登录

Paul Marchese的更多文章

  • March 2025 Technology Times

    March 2025 Technology Times

    ANNOUNCING My New BOOK The Cyber Playbook It’s a no nonsense guide to Cybersecurity and Compliance for Business Owners.…

  • Microsoft's Security Booster

    Microsoft's Security Booster

    Microsoft’s making a simple security booster mandatory on one of its cloud computing platforms. And I believe you…

  • 10 Tips To Protect Yourself From Ransomware

    10 Tips To Protect Yourself From Ransomware

    Everyone is familiar with the threat of ransomware, and hopefully that is through training and not experience. While…

  • What Should Your Cybersecurity Budget Be?

    What Should Your Cybersecurity Budget Be?

    I and my company have been in the industry now for 39 years and as we all know cyber attacks have been almost daily…

  • AMD Versus Intel Security

    AMD Versus Intel Security

    Intel versus AMD CPU Security The last few years security researchers have been looking closely at the speculative…

  • Dark Web - What is it and how do I protect myself from it?

    Dark Web - What is it and how do I protect myself from it?

    The Dark Web today is a under tone of the Internet where the hackers (mostly criminal types) go to sell the data the…

  • Wireless Standard we all use Hacked!

    Wireless Standard we all use Hacked!

    Wireless WPA-2 protocol Hacked! A serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi…

  • Phone Systems - The mighty have fallen

    Phone Systems - The mighty have fallen

    In January Avaya/Lucent/ATT filed for bankruptcy, now Toshiba closes entire phone systems division. This is not a…

    5 条评论

社区洞察

其他会员也浏览了