Follow Jeremy Linkedin Twitter Facebook
Email Jeremy Email
Technology
Feb 17, 2022

37% of Orgs Said They Were the Victim of Ransomware In 2021

Sponsored Content provided by Jeremy Tomlinson - Owner, Enfuse Technology Solutions

While ransomware has become increasingly common, less than 10% of the companies victimized claimed to lose money. That’s a good thing, as it indicates that while ransomware attacks may be on the rise, it also illustrates that businesses have heeded the warnings and are taking the precautions that are necessary to protect themselves.

So, what types of things are companies doing to protect their files and sensitive data from becoming encrypted and having to pay a ransom to the hacker to receive the decryption key? Here’s a look at some of the simple, yet highly effective strategies that business owners have put into place – and that you can try using, too!

Develop and Implement Training and Awareness Program
Developing and implementing programs that are designed to bring awareness to and train end users is an absolute must. Since end users are the most common targets of ransomware attacks, making sure that employees are aware of the threats of these malicious attacks, how these attacks are delivered, and how to identify them, is an absolute must. After all, you can’t very well protect your business if your employees aren’t aware of the dangers.

Enable Powerful Spam Filters
In order to block out phishing emails (attempts that are made by malicious entities in order to obtain sensitive information via email) from making their way to employees and authenticate emails that are coming into inboxes, implement technologies like Domain Message Authentication Reporting and Conformance (DMARC), Sender Policy Framework (SPF), and DomainKeys Identified Mail (DKIM).  These technologies are great, as they are highly effective at preventing email spoofing.

Be Diligent with Emails
Make sure that you – and that all of your employees – take care to scan all messages that come into inboxes. It’s also important to check outgoing emails to see if you spot any threats that may have been attached completely unbeknownst to you. Filter executable files that are utilized to perform various functions on computers so that they won’t be able to reach employees.

Create Firewalls (and put them in place)
Take the time to configure firewalls that will block any access to IP addresses that are known to have malicious intent. This simple tip can be a real lifesaver.

Scan for Viruses and Malware Regularly
Be sure to set up anti-virus and anti-malware programs. Set these programs up so that they execute scans on devices in programs (email, etc.) on a regular basis – and that they check your programs on a regular basis.

Manage Privileged Account Use
It’s also a good idea to manage privileged account that is based on the least privilege. For example, you should not assign any administrative access to any employee, unless doing so is absolutely essential. If it is necessary, employees who are assigned administrator accounts must be instructed to use them only when doing so is absolutely vital.

Configure Access Controls
This includes directory, file, and network share permissions, and the configuration should (again) be done with the least privileged in mind. For example, if it’s only necessary for an employee to access and read certain files, he or she should not be granted write access to the files, shares, or directories.

If you are concerned about the damage Ransomware or other security issues can do to your system, give us a call to go over our security options.



A UNCW alumnus and Army veteran, Jeremy has called Wilmington home since 1992. He started Enfuse Technology in 2011 to give small businesses a trusted IT partner to help navigate the quickly changing technology landscape. With almost 20 years of technical and management experience, Jeremy is passionate about helping people use technology. Experienced leading organizations through technological strategy and change, Jeremy loves helping businesses find out what they need from their IT systems to succeed. 
 
 

Enfuselogo 422122447
Ico insights

INSIGHTS

SPONSORS' CONTENT
Untitleddesign7

A Guide to Joining Your Community Association’s Board of Directors

Dave Orr - Community Association Management Services
Untitleddesign12 101424113223

Annual Strategic Planning

John Monahan - Vistage
Jimheadshot

The Wilmington Construction Market: Trends, Recognition, and Challenges

Jim Hundley - Thomas Construction Group

Trending News

Avelo Airlines To Establish Base At ILM, Add Three Nonstop Destinations

Cece Nunn - Dec 4, 2024

Local Ice Cream Shop Earns National Honors

Staff Reports - Dec 3, 2024

Wilmington-area Residents Appointed To State Panels

Staff Reports - Dec 3, 2024

A First Look At A Planned Aquatic Center And Recreation Village

Staff Reports - Dec 5, 2024

Local Leaders Talk Ongoing, Future Projects At Power Breakfast

Emma Dill - Dec 4, 2024

In The Current Issue

Raising A Different Kind Of Glass

While at events, Carter Jewell realized something was missing: an alcohol-free option that wasn’t just water or soft drinks. Something that...


Branching Out

Live Oak Bank’s latest spinoff emerged last month with the announcement of its $4.8 million seed round....


Couple Gets Moving With Beach Carts

The idea for the Beach Mule, an electric beach cart, came to company owner and founder Will Parker while on the Bald Head Island ferry....

Book On Business

The 2024 WilmingtonBiz: Book on Business is an annual publication showcasing the Wilmington region as a center of business.

Order Your Copy Today!


Galleries

Videos

2024 Power Breakfast: The Next Season