Cybersecurity Roundup: Risk Based Security, Palo Alto Networks, Zix-AppRiver and More
…is a continuous struggle between defenders, with their security controls and detection systems finely tuned to spot suspicious code and behavior, and adversaries, with their ever-evolving bag of tricks designed to outfox these controls – or to get the job done before the controls catch up with them, it said.
The keys to protecting against ransomware include:
- Check that you have a full inventory of all devices connected to your network and that any security software you use on them is up to date;
- Always install the latest security updates, as soon as practicable, on all the devices on your network;
- Verify that your computers are patched against the EternalBlue exploit used in WannaCry;
- Keep regular backups of your most important and current data on an offline storage device as this is the best way to avoid having to pay a ransom when affected by ransomware;
- Administrators should enable multifactor authentication (MFA) on all management systems that support it to prevent attackers from disabling security products during an attack; and
- A layered security model is the best practice all businesses need to implement.