Maximize your protection, eliminate business risks.
Optimize and modernize with cloud transformation.
Empower your people to work securely from anywhere.
What it takes to convince leadership that migrating to the cloud is the right move.
Let us handle IT so you can focus on growing your business.
Get multichannel 24/7/365 expert end-user support.
Stay ahead of attacks with 24/7 protection and monitoring.
Maximize uptime with with industry-leading DRaaS.
Improve efficiency, productivity and outcomes with cloud.
Ensure all mobile devices, everywhere, are secure.
Gain a competitive edge with strategic IT solutions.
This battle-tested checklist enables your team to swiftly initiate a ransomware response.
IT for businesses of all sizes, in any industry.
Empower institution growth with custom IT solutions.
Ensure your firm is always in compliance.
Improve patient care and staff morale.
Deal with pressing legal matters, not IT.
Keep up with the evolving digital landscape.
Focus on your mission by outsourcing IT.
Accelerate PE client deals and secure data.
Leverage your technology as a strategic asset.
Execute initiatives and develop IT strategies.
Get the latest industry insights and trends.
Join us at events in person and online.
Hear from clients and learn more about strategic IT.
See how Dataprise can make IT your greatest asset.
Get informative technical resources from IT experts.
Stay on stop of emerging cybersecurity threats.
Discover the key areas of DR your organization needs to address to ensure downtime is minimized.
Gain a strategic asset by bringing harmony to IT.
Ensure 24/7 support and security with dedicated teams.
Drive business forward by partnering with Dataprise.
Meet our one-of-a-kind leadership team.
Discover the recognition Dataprise has earned.
Help us help businesses with strategic IT.
Embracing different perspectives and backgrounds.
Find a Dataprise location near you.
Dataprise is committed to empowering more women to consider a career in technology.
Posts
Table of content
Last week, Stephen Jones, our Senior Director of Cybersecurity and Blue Team Alpha’s CISO Jeff Wheat, partnered to present our latest webinar, “How to Survive a Ransomware Attack: Infection Vectors, Response, & Long-Term Defense”.
The webinar covered the current state of Ransomware 2.0, which is currently devastating businesses across all industries. It also covered the dos and don’ts of real-life responses, as knowing the right approach is critical to protecting your business.
Here we will break down the most common infection vectors and cover tips on remediation and post-incident communication. After reading this summary, check out our full webinar below.
In 2020, there was a Ransomware victim every 10 seconds. Ransomware started as a shotgun effect – its main attempt was to cast as big of a net as possible to hit as many individuals and companies as possible. In 2017, about 54% of companies saw some form of Ransomware incident. In 2021, attacks have become increasingly strategic as Ransomware begins to strike more lucrative businesses, such as the recent attack the Colonial pipeline that led to a stoppage in fuel delivery to the East Coast for an entire week. In the same way that you as a business would identify your market and figure out how to optimize your success, Ransomware attackers are doing the same thing. The IBM Security Report of 2020 estimated that the average cost of a cyberattack in 2020 was $3.86 million.
Ransomware attackers are also finding new ways to entice organizations to pay, including through double extortion. Double extortion is when Ransomware attackers steal a copy of your data and either delete or encrypt your local copy. Then, the attackers will ask you to pay twice- once so you can regain access to your local copy, and once to stop them from sharing or leaking the copy that they took. The increased leverage makes it more likely you will be enticed to pay.
The three most common infection vectors are:
Phishing emails and malicious links are incredibly common. If you open your inbox today, you probably have emails with malicious links in them. Ransomware attackers will go so far as to create a specially crafted websites to try to increase legitimacy and make end-users believe that it is not malicious. These vulnerabilities are the heart of common infection vectors, and phishing emails coupled with malicious links are the delivery mechanism.
The best way to defend yourself against these common vectors are:
Some common signs that you are under a Ransomware attack include:
These can all be precursors to an act or a sign that an attack is imminent. It may seem small to you, but it’s important to report anything suspicious before it amounts to anything more serious.
Response timing is critical when you believe you are under a Ransomware attack. Here is a list of Dos and Don’ts to help guide your response:
DO:
DO NOT:
As technology continues to advance, Ransomware attackers will continue to find new ways to extract sensitive information from your company. It is more important than ever to take preventative measures to ensure rapid response time and minimal damages occur. At Dataprise, we can help you get a jump start in mitigating risk with a ‘no cost’ IT environment assessment. Find out more below!
INSIGHTS
Subscribe to our blog to learn about the latest IT trends and technology best practices.