By Chris Hill
A pair of substantial ransomware attacks on critical US businesses just weeks apart means that nobody needs to be told how dangerous these types of attacks can be and how reliant we are on IT services. After all the headline around these attacks, people who literally don’t know the difference between a network server and a restaurant server know what ransomware is all about.
So, let’s jump to the heart of the matter:
Organizations that implement Incident Prevention only have to do just these three things to recover from such attack:
- Incident Response
- Ransomware Removal
- Data Recovery
Compare that to paying millions in ransom!
What can you do to mitigate your risk of a ransomware incident?
You can turn to the LRS Security Systems team. We have incident prevention solutions that can help minimize the overall impact of these security incidents:
- Foundational Security Assessment
- Incident Response Planning
- Network Segmentation
- Maturity Assessments
- Visual Tape Library (VTL) Appliances
- Tabletop Exercise
- Cyber Range
- Security Awareness Training
- Email Security Software
- Backup data Software
- Cloud data repositories
We start with the Foundational Security Assessment, in which our team conducts an assessment of your firewalls, Active Directory, and internal and external vulnerabilities. Then we deliver a Corrective Action Plan listing the specific steps to take to strengthen your foundation.
Based on that plan, we can begin Incident Response Planning so your organization knows what to do when the ransomware attack occurs.
If you would like to talk to us about incident prevention or any other security issue, fill out the form below.
About the author
Chris Hill serves as our Security Practice Leader. Chris has more than 24 years of business and professional experience in IT and holds a Bachelor of Science degree in Electrical and Electronics Engineering. Formerly the State of Illinois Chief Information Security Officer, Chris is currently pursuing his accreditation as a Certified Information Systems Security Manager.