104
6. Ensure that operating systems, software and firmware on devices are kept patched and updated. A
centralized patch management system may facilitate this process.
7. Regularly back up data using cloud-based or physical backups and verify its integrity. Ensure that
backups are remote from the main corporate network and machines they are backing up.
8. Categorize data based on organizational value and then physical or logical separate networks can
be created for different business functions.
9. Provide awareness and training on the threat of ransomware, how it is delivered, how to avoid
becoming a victim, and how to report suspected phishing attempts.
10. Manage the use of privileged accounts and ensure the principal of least privilege is implemented
not just for data but also for file, directory and network share permissions.
Developing awareness about these dual revenue attacks is the first step in preparing your
organization to deal with these threats. By applying a combination of technical and process controls
you can strengthen your defenses against innovative cybercriminals and minimize the impact should
you become a victim.
See more at
http://www.securityweek.com