Insights: Article

Protecting Yourself from Ransomware

A Seven-Part Recipe to Avoid Ransomware

By Mike Arvidson

May 19, 2017

The global ransomware attacks on May 12 and 14 should have you spooked… here’s what to do next!

Remember: Cybersecurity is not static, and it’s highly complicated so no one solution will be a quick fix. There’s no magic bullet when it comes to securing your organization. But there is a recipe of solutions that can move your organization in the right direction.

To be as secure as possible, you must take a multi-layered approach involving seven key areas.

  1. Protect your business from malicious activity by educating your employees. You’ll want to roll out security awareness and user training so that your team is armed with insight and is discerning enough to not open or click on suspicious links and attachments. As the business owner, it’s your duty to teach and empower your employees to interact safely with email and websites.

  2. Employ an email security system. An email security system should be in place to protect against threats coming through email. Even if your team has been trained to be cautious, without an effective and strong security system, threats can still get through.

  3. Ensure that your systems are up to date. Patch management solutions are in place to ensure that the latest fixes from the software development companies are actually installed across your organization. Think of the latest iPhone update (have you installed it yet?): Sometimes people delay an update for various reasons, but what they need to know is that by not updating with each new release, they’re putting themselves and organizations at risk. A proper patch management solution effectively administers firmwide updates and closes security holes in your systems.

  4. Secure your connection to the Internet.A firewall with the intelligence and advanced security detection capabilities to detect and prevent threats from entering your business network can help ensure security.

  5. Deploy Next-Generation Endpoint security (anti-virus) on servers and work stations. Using a real-time threat security prevention solution is key to detecting new threats quickly enough to prevent infections.

  6. Use application whitelisting. Application whitelisting will truly control which programs can run throughout your network.

  7. Use the appropriate backup software. Do you know what you’re backing up and what you are not backing up? Are your backups working? Have you tested a restore recently? Do you have three copies of your data on two different media types and at least one copy of your data offsite? Your backups will be critical to recover data in a time of need.

Latest Insights

March 25, 2019
The IRS Section 7520 rate will decrease to 3.0% for April. Near Zero Out Grantor Retained Annuity Trusts, Sales to Intentionally Defective Grantor Trusts and Charitable Lead Annuity Trusts are attractive since interest rates are near historical…
March 25, 2019
New rules designed to make it easier for the IRS to audit partnerships have also created new considerations for tax-exempt organizations entering into partnerships.
March 25, 2019
Nonprofits are often a target for duplicated websites. Make sure your donors are giving to you and not an imposter.
March 25, 2019
When it comes to compliance requirements, period of performance may seem simple, but there are a few pitfalls that must be avoided along the way.
March 22, 2019
The advent of better technologies has created a huge opportunity for critical access hospitals to access information that can help them make informed decisions and improve efficiency.
March 21, 2019
Arizona has filed a lawsuit against California over its “doing business” tax.