How to Protect Your Organization from Ransomware

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next How to Protect Your Organization from Ransomware-7 Next

Contain

Usually when ransomware hits, IT doesn't learn about the infection until after the malware is already inside the network and the damage is well underway. If your business is a victim of a ransomware attack, your top priority should be to isolate the infection to keep it from spreading. It's critical to take infected machines off the network immediately and to identify the source of the malware so that any security vulnerabilities can be patched.

Ransomware is taking organizations of all sizes by storm with a keen eye on the health care sector, as made evident by recent outbreaks in the Hollywood Presbyterian Medical Center in Los Angeles, and more recently the Methodist Hospital in Henderson, Kentucky. Although the ransom can be costly, the reality is that the downtime inflicted by ransomware can be even more damaging to businesses.

A recent report commissioned by Intermedia found that 72 percent of employees were unable to access their files for at least two days, and 32 percent were locked out for five days or more. Richard Walters, SVP of Security Products at Intermedia, believes that companies need to take this emerging threat more seriously, and can start to do so by taking the necessary steps to minimize the damages.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.