Cyber Consultant Shares 6 Tips to Avoid Ransomware Attacks
Translator
Editor
2 July 2024 19:13 WIB
TEMPO.CO, Jakarta - Cyber security consultant Spentera highlighted that ransomware recently targeted the Temporary National Data Center or PDNS also threatens both the private and public sectors.
Quoting the research published by Cyberint, Spentera explained that ransomware attacks rose by 55 percent from 2022 to 2023. Of the victims surveyed, 69 percent said they had paid the requested ransom totaling US$1.1 billion.
Tactically, ransomware operates through illegal access to systems often for sale on the dark web, supported by a Ransomware as a Service (RaaS) model that makes the attack harder to track. Once the system is infected, the data is then encrypted and the victims are asked to pay a ransom.
Spentera's Director of Blue Team Operations, Thomas Gregory, explained that implementing multi-factor authentication or MFA and regular system updates is necessary to minimize ransomware attacks. Network access restrictions and segmentation are a must to detect and hinder hacker movements.
“Not only do these measures strengthen cyber defenses, but they also ensure more comprehensive business operational security. It’s also essential to train employees on cyber awareness and protection regularly,” Thomas said in a statement quoted by Tempo on Monday, July 1, 2024.
Thomas said the combination of sophisticated technology and ongoing cyber awareness education is the key to preventing such attacks. “With the right backup and recovery policies, organizations can recover quickly after an incident and minimize losses," said Thomas.
6 Measures to Protect Systems from Ransomware
1. Implement Multi-Factor Authentication (MFA)
MFA is intended to add a layer of security to a system to avoid access from unauthorized users. Since the verification process is multi-layered, data can still be secured even if the password was previously stolen.
2. Patching and updating the system regularly
This step is mandatory because it can help close security gaps and protect the system from new threats.
3. Limiting access to various resources over the network
Controlling and limiting access to resources through the network to only relevant users would limit the attackers’ space to find loopholes.
4. Implement Network Segmentation and Traversal Monitoring mechanisms
In simple terms, a network is divided into separate segments or subnets. This helps the security team monitor activities occurring between these segments, including incoming and outgoing traffic, to detect and hinder movement by the attacker.
5. Implement Identity Access Management (IAM) and Privileged Access
Organizations are advised to use tools that enable efficient management and limit the use of admin accounts to protect identity and privileged access.
6. Implement data backup and restoration procedures and policies
Data backup could be one of the options to prevent ransomware attackers from achieving their goals, getting the victims to pay a ransom. With comprehensive backup and restore policies and procedures, data can be recovered quickly after a hacking incident.
ALIF ILHAM FAJRIADI
Editor’s Choice: 10 Countries Battling Major Data Breaches; Canada Included
Click here to get the latest news updates from Tempo on Google News