Story image

Attackers will get in: Three frameworks that help you through ransomware

22 Nov 17

Did you know the first ransomware hit computers in 1989? The PC Cyborg Trojan demanded a $189 ransom. The Trojan hid all folders and encrypted files on a PC’s C: Drive. If victims didn’t pay the ransom, the ransomware’s actions would not be reversed.

Fast-forward to 2017 and WannaCry and NotPetya were easily the most prevalent ransomware strains. NotPetya was probably the most notorious.  

All it needed to do was use all saved SMB credentials on a Windows system and use these to log on to other machines. This means it could spread – fast. It also offered no way to contact the attacker in the event that victims paid the ransom.

These attacks are reminders that the cyber threat landscape is sophisticated to the point in which we have to accept that attackers will get into our networks.

But are we prepared? To successfully defend our organisations, we need to prepare and understand the indicators of compromise.

LogRhythm’s free guide takes an in-depth look at the typical phases of a ransomware attack, including:

  • How ransomware attacks begin – it can take as few as 15 minutes
  • How ransomware attacks progress through endpoints and networks
  • NIST, SANS and Navy incident frameworks that help organisations handle ransomware attacks
  • What you can do to prevent or limit an infection, including a five-step guide from preparation to recovery

With good planning and a definitive course of action, an attack can have a minimal impact to our organisations.

Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
How Schneider Electric aims to simplify IT management
With IT Expert, Schneider Electric aims to ensure secure, vendor agnostic, wherever-you-go monitoring and visibility of all IoT-enabled physical infrastructure assets.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
Preparing for the future of work – growing big ideas from small spaces
We’ve all seen it: our offices are changing from the traditional four walls - to no walls. A need to reduce real estate costs is a key driver, as is enabling a more diverse and agile workforce.
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
How AI can fundamentally change the business landscape
“This is an extremely interesting if not pivotal time to discuss how AI is being deployed and leveraged, both in business and at home.”