Ransomware protection and a day at the beach

Ransomware is front page, global news. It is a hot topic as everyone is talking about it, from Wall Street to Main Street. Unfortunately, a ransomware attack is a matter of when, not if. 

Ransomware is front page, global news. It is a hot topic as everyone is talking about it, from Wall Street to Main Street. Unfortunately, a ransomware attack is a matter of when, not if.  

Beaches are a great hot day activity; sitting outdoors, enjoying the sun, a cool drink, and playing in the water. Besides ransomware being a hot topic and beaches being a hot day activity, what else do they have in common? Both require preparation to be successful! Before you leave the office, read my list of the 10 ransomware tips to keep you up-to-date on how to prevent ransomware. Now that you are ready to go, I have included my Top 10 Beach items for an enjoyable day. 

Hopefully, both lists will prevent you from getting burned. 

10 Ransomware Prevention and Recovery Tip

1. Plan, plan, and more planning for ransomware protection and recovery

Plan for the worst, and hope you never have to use it.   

It is paramount to have a multi-layer security strategy and keep in mind that recovery readiness is critical. Ensuring your mission-critical data can withstand a targeted attack designed to destroy primary and backup copies of your data.

2. Employees are key to a good defense; conduct employee security training

Educate employees on avoiding ransomware and detecting phishing campaigns, suspicious websites, and other scams. Despite their best intentions, employees are still a leading cause of malware.

3. Ensure patches are up-to-date and stay current

Keep software, firmware, and applications up-to-date to reduce the risk of ransomware exploiting common vulnerabilities. While this is a surprisingly easy fix to closing vulnerabilities, many organizations do not make the time or resources available to get this done promptly.  

Top 10 Beach Items

Sunscreen apply often. 

Hydration, you can never drink too much water.

Sunglasses and don’t forget to put sunscreen on your nose. 

A good book, or two.

Footwear/Sandals, practical and can be worn into the water.

Hat, wide brim is better.

Snacks, indulge, you are at the beach.

Beach towel/blanket, and bring extras.

Beach chair, you want to be comfortable!

Beach umbrella, extends your time on the beach!

4. Install antivirus and antimalware protection

Use antivirus software with active monitoring designed to thwart advanced malware attacks.

5. Implement multifactor authentication

The process of authentication requires each user having a unique set of criteria for gaining access. Enabling multifactor authentication methods makes it highly unlikely that a valid user account can be impersonated.

6. Segment your networks to prevent lateral movements

In the event a cyberattack is successful, don’t give them unlimited access within your network. Divide your network into smaller segments to prevent lateral movement and to contain the damage. 

7. Know your data to safeguard your data

You need to identify business-critical data and sensitive data across your environment and data silos. Then determine if the data are exposed to vulnerabilities. Using data insights, you can efficiently remediate these risks by removing, moving, or securing this exposed data to reduce the chances of costly breaches and ransomware attacks.

8. Perform regular backups

Employ a backup and recovery solution that offers a multi-layer framework for protecting, monitoring, and recovering from threats. The solution needs to support a 3-2-1 backup strategy for rapid recovery and secure cloud copies for added protection. 3-2-1 is 3 copies of your data, on 2 different media types, with a copy off-site and preferably air-gapped.   

9. Test, test, and test

Once you have your plan in place, along with the procedures and technologies to execute it, make sure it’s going to work as needed. Perform frequent tests to verify that you can meet the SLAs you’ve defined for critical and high-priority data and applications.

10. Enable the Security Health Assessment Dashboard (if you are a Commvault customer)

Utilize the Security Health Assessment Dashboard to identify, assess, mitigate, and monitor security controls within the Commvault data protection environment. The dashboard will identify controls that are available in the Commvault environment and provide scoring and remarks to allow you to assess the risk properly, continuously monitor your security posture, and will give insights to take the appropriate actions.

Ransomware prevention does not have to be complex.  With the proper preparation starting with creating a plan, constant monitoring, and a strong backup and recovery solution, you can get out of the office and enjoy a day at the beach. Enjoy your summer!

For more information on Commvault’s ransomware protection and recovery, visit commvault.com/ransomware

More related posts

Fending off Ransomware with Commvault

Fending off Ransomware with Commvault

Nov 14, 2022
View Fending off Ransomware with Commvault
This Halloween trick ransomware and save your data treats

This Halloween trick ransomware and save your data treats

Oct 28, 2022
View This Halloween trick ransomware and save your data treats
Ransomware Protection with Air Gap 

Ransomware Protection with Air Gap 

Oct 26, 2022
View Ransomware Protection with Air Gap