Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Ransomware Protection in the Age of WannaCry: How to Limit the Impact of an Infection and Speed Recovery

If you read IT security news (or, quite frankly, any news at all), you’re familiar with the global WannaCry Ransomware attack that was launched recently. It’s a sobering lesson in the value of IT security measures, such as malware detection and hardened virtual appliances, and the role they play in ransomware protection.

On the off chance you’ve missed the news, here’s the story. Hackers used an exploit identified by the NSA to launch a cyberattack earlier this month, infecting over 200,000 end points in over 150 countries with ransomware (a type of malware that encrypts files and demands ransom for them to be restored for access). A particularly virulent strain of ransomware, WannaCry encrypts files on vulnerable computers with insufficient ransomware protection, due to the computers running older operating systems and missing critical patches. Once in, hackers demand $300 to $600 in ransom, payable in bitcoin.

Understanding Ransomware and Ransomware Protection

Ransomware relies on the ability to open the file, modify it and replace the file with an encrypted copy, and with mapped drives any shared content could be rendered unreadable.

When ransomware encrypts files on an individual system, productivity is disrupted. The end user loses access to important data, and one or more IT engineers will be involved in any attempted recovery. In many cases, the attacked organization has no option but to reimage the machine.

By contrast, when ransomware attacks files in shared network storage, the impact is much greater. Entire departments can lose content, including potential backup files if they were mapped to the compromised machine.

Without paying the ransom, there is little one can do to recover files which were only stored locally on the infected system. Modern ransomware is particularly crafty, deleting shadow copies of files and using other techniques that might help victims restore files without paying ransom.

Defending against Ransomware

There are a number of ransomware protection measures organizations can deploy to reduce the risk of ransomware like WannaCry and other malware attacks:

  • Use a current operating system that includes the latest security features
  • Install all available security patches for your operating system and key applications
  • Exercise extreme caution when opening attachments, particularly .zip files
  • Deploy an anti-virus and/or sandboxing solution that scans, flags and blocks infected files from reaching users or executing
  • Run a secure file sharing service in a hardened virtual appliance, so secure file sharing is never compromised by incoming files infected with ransomware

Ransomware Protection from Accellion

In light of the WannaCry epidemic, we wanted to let our customers know that content stored within Accellion’s solutions are protected from ransomware, including WannaCry. Furthermore, we wanted to highlight the ways the Accellion secure file sharing and governance platform can help limit the impact in the case a system on your network does get infected with ransomware.

The Accellion secure file sharing and governance platform provides ransomware protection through a hardened virtual appliance that significantly reduces the number of entry points and all but eliminates the likelihood of a malware attack. Faced with a secure access layer for enterprise content, wherever that content resides, the WannaCry worm is unable to spread. In addition, fileshares based on the Common Internet File System (CIFS) accessed through Accellion are protected even if accessed from an infected machine.

Lastly, built-in AV scanning and integrations with advanced threat prevention (ATP) technologies like Check Point SandBlast provide critical ransomware protection by scanning all incoming files for viruses and Zero Day attacks before they enter the organization.

Accelerating Time to Recovery with the Accellion Secure File Sharing and Governance Platform

For organizations that use the Accellion platform to store their business-critical files, or even copies of their local content for collaboration purposes or simple mobile access, the process of recovery is significantly easier and faster. If files are not kept on individual systems or on network share drives, but instead are accessed through the Accellion platform, once the infected system is restored to a clean state, any files stored using Accellion can be safely accessed by, or copied back to, the user’s machine. This will allow ongoing operations to continue, and faster recovery than restoring from backup (without paying a ransom).

Even if a user does expose their organization’s network to a ransomware virus, and then uploads or syncs an encrypted file through Accellion, the customer can revert to a previously unencrypted copy of the file (as long as the customer has not disabled the file versioning capability which is on by default).

Learn more about the security capabilities within the Accellion secure file sharing and governance platform provide organizations with critical ransomware protection.

The post Ransomware Protection in the Age of WannaCry: How to Limit the Impact of an Infection and Speed Recovery appeared first on Accellion.



This post first appeared on Accellion Blog - Accellion, please read the originial post: here

Share the post

Ransomware Protection in the Age of WannaCry: How to Limit the Impact of an Infection and Speed Recovery

×

Subscribe to Accellion Blog - Accellion

Get updates delivered right to your inbox!

Thank you for your subscription

×