https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-logo.png
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • EMEA
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 501 Reports
    • MSPmentor Education
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • Awards
    • Back
    • European Partners 51 (EP 51) Awards
    • Excellence in Digital Services
    • MSP 501 Rankings
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Industry Events
    • Webinars
  • More
    • Back
    • About Us
    • Advertise on Channel Futures
    • Contact Us
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • EMEA
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 501 Reports
    • MSPmentor Education
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • Awards
    • Back
    • European Partners 51 (EP 51) Awards
    • Excellence in Digital Services
    • MSP 501 Rankings
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Industry Events
    • Webinars
  • More
    • Back
    • About Us
    • Advertise on Channel Futures
    • Contact Us
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Digital Service Providers
  • Cloud Service Providers
  • CHANNEL PARTNERS ONLINE
 Channel Futures

From the Industry


Getty Images

Sponsor Content

reading ransomware digital computer screen magnifying glass 3D Illustration

Everything MSPs and MSSPs Need to Know about Ransomware

  • Written by Sophos Guest Blogger
  • December 2, 2019
MSPs and MSSPs need to understand the ways in which their customers—and they themselves--are at risk.

The 30th anniversary of ransomware is coming up in December, and it’s safe to say ransomware has come a long way from the first 1989 attack that was spread by floppy disks delivered via snail mail.

The modern era of ransomware really began in 2013 with CryptoLocker, which was the first ransomware to spread through compromised websites and emails. Ransomware has continued evolving since then, up until targeted large-scale attacks like SamSam and Ryuk became common in 2018. This year, as we found in our 2020 Threat Report, we’ve seen attackers raise the stakes even more by changing or adding traits to confuse anti-ransomware protection.

Ransomware attacks are increasingly aggressive and devastating, and MSPs and MSSPs need to understand the ways in which they themselves are at risk. Cybercriminals are infecting MSPs and MSSPs with the goal of reaching their customers’ systems in turn. Responding to an attack is costly, whether you’re spending time finding ways to decrypt files yourself or shelling out money for a ransom. Either way, ransomware attacks can result in lost business productivity and potentially business-threatening downtime, and there’s more MSPs and MSSPs could be doing to guard against these threats.

Let’s take a closer look at today’s ransomware landscape and how MSPs and MSSPs can help organizations stay protected.

How Ransomware Attacks Start

There are a few common techniques used among attackers, including three ways ransomware attacks tend to start. Attackers might send malicious phishing emails that look legitimate, but are designed to get the target to open or download an attachment. By opening those attachments, ranging from Word documents with macros to JavaScript files disguised as .txt files, victims unwittingly install the ransomware on their systems.

Another common way to get infected is through poisoned websites–legitimate websites that have been infected with an exploit kit. Users might hover over an ad or click on something that looks innocent. In some cases, just visiting the page is enough to accidentally install ransomware on the computer and run it.

A third technique, often used to infiltrate MSP and MSSP networks, involves exploiting Remote Desktop Protocol (RDP) and other remote access holes. Each computer running RDP is a potential gateway into an organization’s internal network–and they’re often protected by nothing more than a username and password. Attackers have found great success guessing individual passwords, sometimes by brute force, to gain access to corporate networks and conduct ransomware attacks.

How Ransomware Attacks Unfold

After the initial exposure, there are two ways ransomware attacks typically unfold: what we call “fire and forget,” or targeted ransomware.

Fire and forget attacks aim for a high volume of smaller ransoms. Cybercriminals launch an attack aimed at a number of organizations, and they use automated techniques to try to infect as many computers as possible. Here’s how this might play out: After using a malicious email or compromised website to gain entry, attackers download ransomware that encrypts files and deliver a ransom note demanding payment to decrypt those files.

Targeted ransomware, on the other hand, focuses on one victim at a time, but demands much higher ransom fees. These manual attacks tend to gain access to a network through RDP or malware. They then move laterally through the network, escalating their privileges to administrator, spreading ransomware that encrypts files, and ultimately demanding a ransom.

How to Stay Protected

It should come as no surprise that ransomware attacks can be incredibly costly for MSPs and MSSPs. In fact, an MSP recently paid $150,000 to hackers to recover data after a ransomware attack that spread out to their end-customer systems. Trying to avoid downtime and data loss requires a proactive approach with advanced protection at every stage of an attack, from network protection to securing endpoints.

Having effective security products isn’t all it takes, however. Educating employees about ransomware and the phishing techniques commonly used to launch attacks can help stem attacks at their access point. For MSPs and MSSPs, this means both educating your employees and providing resources for customer education.

To that end, here are a few security best practices to keep in mind.

  • Always be cautious about unsolicited email attachments, and don’t enable macros in attachments received via email. Open JavaScript (.JS) files in Notepad so you can scan the file contents for malicious code first.
  • Enable two-factor authentication.
  • Either implement Tamper Protection or lower user privileges from Admin on the local PC, to prevent the uninstallation of security services.
  • Apply patches early and often.
  • Use strong passwords and change them often. And as always, backup regularly and keep a backup file off-line and off-site.

Scott Barlow is VP Global MSP, Sophos.

 

This guest blog is part of a Channel Futures sponsorship.

Tags: MSPs Best Practices From the Industry Intelligence Security Sophos Sponsor Content

Related


  • Concentric Circles in Tunnel
    Now’s the Time to Abandon Islands of Security for a Synchronized Approach
    MSPs and MSSPs should encourage organizations to look beyond cost and instead focus on future proofing their security defenses.
  • Endpoint Security
    Seven Uncomfortable Truths of Endpoint Security
    To understand the realities of endpoint security today, Sophos commissioned independent research specialist Vanson Bourne to survey 3,100 IT managers across the globe. The resulting paper reveals the experiences, concerns and future plans of organizations in 12 countries and six continents. It provides deep insight into the day-to-day challenges IT teams face securing their organizations […]
  • IoT security
    Firewall Best Practices to Block Ransomware
    Ransomware attacks are only increasing in complexity and are getting more efficient at exploiting network and system vulnerabilities, leaving organizations with a significant clean-up bill. Modern firewalls are highly effective at defending against these types of attack, but they need to be given the chance to do their job. In this whitepaper we will discuss […]
  • Gartner Unveils Magic Quadrant for Endpoint Protection Platforms EPP
    Sophos MSP Connect delivers greater efficiency and zero ransomware to RODIN and its customers
    RODIN is an Australian managed service provider (MSP), primarily dealing with small to medium-sized businesses ranging from 20 to 200 seats. Prior to joining the Sophos MSP Connect program, RODIN had worked with traditional security vendors and wanted to increase its capabilities while improving overall customer satisfaction. Read about how RODIN was able to achieve […]

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Sophos XG Firewall
  • Intercept X with EDR
  • Comprehensive Exploit Prevention
  • Synchronized Security provides SureBridge IT with a competitive edge

Galleries

Images: Channel Evolution Europe Featuring Avant, 8×8, Sophos, CenturyLink, More

December 5, 2019
view all

From the Industry

The Importance of Strengthening Your Cyber Security Culture

December 4, 2019

Don’t Let Lack of HIPAA Compliance Make Your Business Sick

December 4, 2019

Using ADR to Help Secure Your Business First

December 4, 2019
view all

Webinars

How Your MSP Can Deliver the Ultimate Customer Experience

December 10, 2019

Edge of Tomorrow: Network Security in the Age of Data-Driven Business

December 11, 2019
view all

White Papers

Secrets to Sustainable Growth – for MSPs, by MSPs

December 4, 2019

Why Managed Security Presents A Golden Opportunity for MSPs

November 26, 2019

The Ultimate Guide to On-Site Managed Services

November 26, 2019
view all

Events

Channel Partners Conference & Expo

March 9, 2020 - March 12, 2020
view all

Videos

FASTCHAT: Why an MSP Needs to Extend Detection and Response Beyond Endpoint Security

October 22, 2019

Ingram Micro: It’s Up to Our MSP Partners to Keep Clients ‘Out of the Headlines’

October 14, 2019

Liongard: Here’s How We ‘Roar’ for the MSP Community

October 14, 2019
view all

Twitter

ChannelFutures

.@SlackHQ CEO @stewart Butterfield says #Office365 users put #MicrosoftTeams aside to use #slack… twitter.com/i/web/status/1…

December 6, 2019
ChannelFutures

Integrating managed services into your existing agent business model sounds great in theory, but can be difficult t… twitter.com/i/web/status/1…

December 6, 2019
ChannelFutures

This #501er Friday we chat with #MSP501 winner @qosnetworks about #IoT, #AI & the increased adoption of SD-WAN.… twitter.com/i/web/status/1…

December 6, 2019
ChannelFutures

.@AWS CEO Andy Jassy: JEDI not ‘adjudicated fairly’ #AWSreInvent dlvr.it/RKp6wJ https://t.co/vcOZ6fnjMZ

December 6, 2019
ChannelFutures

An increase in the use of #collaborationapps may be making employees more productive, but just like #email there's… twitter.com/i/web/status/1…

December 5, 2019
ChannelFutures

#Datastorage vendor @WekaIO launches its inaugural channel partner program to drive AI and ML storage.… twitter.com/i/web/status/1…

December 5, 2019
ChannelFutures

Look for vendor red flags as you evaluate #datacenter #hardware performance and cost, says @GetInterconnect.… twitter.com/i/web/status/1…

December 5, 2019
ChannelFutures

Great pics here from the inaugural #EvolutionEU feature @Avant_CCC @CenturyLinkBiz @8x8 and more.… twitter.com/i/web/status/1…

December 5, 2019

MSSP Insider

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Channel Partners Online

Want more? Find more channel news and analysis on our sister site, Channel Partners.

Media Kit And Advertising

Want to reach our audience? Access our media kit

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Online
  • Channel Partners Events
  • MSP 501
  • MSSP Insider
  • IoT World Today
  • Webhostingtalk

WORKING WITH US

  • Contact
  • About us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Cookie Policy
  • Privacy
  • Terms
Copyright ©2019 Informa PLC. Informa Telecoms & Media Limited is a company registered in England and Wales with company number 00991704 whose registered office is 5 Howick Place, London, SW1P 1WG. VAT GB365462636. Informa Telecoms & Media Limited is part of Informa PLC.
✕

channel futures Logo

Want to stay updated? Sign up for our Channel Futures newsletters today.

Websites are now required by law to gain your consent before applying cookies. We use cookies to improve your browsing experience. Parts of the website may not work as expected without them. By closing or ignoring this message, you are consenting to our use of cookies.
X