Ransomware isn’t new – we can track it back to attacks using floppy disks in 1989 – and like all attacks, it has evolved over time. As defenders adopted yesterday’s protections attackers respond by upping their game. The original “smash and grab” approach has moved on, leading to today’s more sophisticated and dangerous landscape, with:
• Ransomware-as-a-Service where attack tools are commercialized, meaning less skilled teams can buy and use advanced weapons they could not build for themselves
• Double Extortion where Cybercriminals don’t just lock your data where it sits – they pull out a copy, exploiting your weak, asymmetric network controls. This allows two threats– blocking your access to your own data, and threatening to release it publicly if you don’t pay.
• Cloud ransom attacks Every new tech has a new attack surface, and new exploits targeting it, and cloud is no different.
Fighting Ransomware 2.0 means upgrading your defensive techniques – as the exploits evolve, so must your response. Combating both double-dip extortion demands and cloud-focused attacks requires understanding your attack surface, so you can find and fix your defensive gaps and open pathways before the bad guys use them against you. Concern about these attacks has reached the C-suite as ransoms have impacted not only brand and customer trust, but the bottom line with huge financial implications.
In this webinar we will cover:
• Why network segmentation is the essential strategic response
• Comprehensive strategies vs. single point solutions needed
• The true impact of lateral movement within your network
• Why an ounce of prevention is worth a pound of cure
We’ve moved from smash and grab to sophisticated heists. This requires a cyber security strategy that works harder to avoid not only someone getting in, but plan to stop lateral movement and exfiltration. Control the blast radius, and you have a fighting chance at protecting your brand, your customers and your bottom line.