+ All Categories
Home > Technology > Ransomware Mitigation Strategies

Ransomware Mitigation Strategies

Date post: 16-Jan-2017
Category:
Upload: landesk
View: 67 times
Download: 1 times
Share this document with a friend
26
Ransomware: The NSA’s Top 10 Mitigation Strategies (and More) Phil Richards, Chief Security Officer Michael Dortch, Senior Product Marketing Manager
Transcript

Ransomware: The NSA’s Top 10 Mitigation Strategies (and More)

Phil Richards, Chief Security OfficerMichael Dortch, Senior Product Marketing Manager

The Scope of the Problem

Ransomware has quickly emerged as one of

the most dangerous cyberthreats facing

both organizations and consumers, with

global losses now likely running to hundreds

of millions of dollars.

—Symantec Corp., “ISTR [Internet Security Threat Report] Special Report: Ransomware and Businesses 2016,”

Insecurity Everywhere

• “91% of…board members [surveyed] said they can’t read a cybersecurity report and are not prepared to handle a major attack.”

• “40% said they feel no responsibility for the consequences of being hacked.”

• “[Hacking] is costing the U.S. $5 trillion each year, or approximately one-third of our country’s GDP annually.”

• “90-95% of all hacking begins with a phishing email.”

The Government to the Rescue!

Three-Pronged Focus

Education

ProactivePreventionBusiness

Continuity

Outline of Activities

1. Educate your Staff

2. Email Hygiene3. Network Hardening4. System Hardening

5. Backup Data6. Incident Response

EducationProactive

PreventionBusiness Continuity

Education

Email Hygiene

Network Hardening

System Hardening

Backup Data

Incident Response

How We Help

Consolidation

Visualization

Personalization

The LANDESK Portfolio

S e c u r eC o n f i g u r a t i o n M a n a g e m e n t

A s s e tM a n a g e m e n t

S e r v i c eM a n a g e m e n t

U n i f i e dE n d p o i n t

M a n a g e m e n t

innovative, proven, consistent, customer-driven technologies

Not just technologies…• Partners• Services• User

Community• And more…

Up to 85 percent of targeted attacks are

preventable by:

• application whitelisting;

• patching of applications;

• patching of and operating systems; and

• restricting of administrative privileges.

—Australian Signals Directorate (ASD)(their equivalent of the US NSA)

Everybody works in security now.

—Dan Lutter, Director, Field Technology Services, Advocate Health Care

Questions?

Thanks. Let’s Talk.

Michael [email protected](US) 415-310-6480@DortchOnIT

Phil [email protected](US) 801-208-1642https://www.linkedin.com/in/phil-richards-3870402


Recommended