Skip to content

Cyber Security And Bitcoin Blockchain News

The World

  • Institutional Investors Remain Bearish As Short Bitcoin Sees Record Inflows bitcoin news
  • How Will Blockchain Revolutionize Communication bitcoin news
  • Strong US Dollar Posts 5-Week High, Markets Price in a 75 bps Fed Rate Hike for June – Economics Bitcoin News bitcoin news
  • Bitcoin Hashrate Soars To New All-Time High, Will Price Follow bitcoin news
  • Bitcoin Could See 10% Jump, As Volatility Drops To 18-Month Low bitcoin news
  • Investors May Expect Downside For Bitcoin And Ethereum Market For The Next 3 Months bitcoin news
  • Coinbase Reduces the Size of the Firm’s Workforce by 18% – Bitcoin News bitcoin news
  • Blockchain Data Indicates $10M Worth Of Ether From The Ronin Exploit In Rotation bitcoin news

Mitigate Ransomware in a Remote-First World

Posted on June 21, 2022 By root


Ransomware

Ransomware has been a thorn in the side of cybersecurity teams for years. With the move to remote and hybrid work, this insidious threat has become even more of a challenge for organizations everywhere.

2021 was a case study in ransomware due to the wide variety of attacks, significant financial and economic impact, and diverse ways that organizations responded. These attacks should be seen as a lesson that can inform future security strategies to mitigate ransomware risk. As an organization continues to evolve, so should its security strategy.

The Remote Environment Is Primed for Ransomware

With organizations continuing to support remote and hybrid work, they no longer have the visibility and control they once had inside their perimeter. Attackers are exploiting this weakness and profiting. Here are three reasons they’re able to do so:

Visibility and control have changed. Most organizations now have employees working from anywhere. These employees expect seamless access to all resources from unmanaged and personal devices on networks outside the traditional perimeter. This greatly reduces the visibility and control that security teams have and can make it difficult to understand risks posed by users and the devices they’re working from.

Mobile devices make it easier for attackers to phish credentials. Attackers are always looking for discreet ways into your infrastructure. Compromising an employee’s credentials enables them to gain legitimate access and remain undetected.

Their primary tactic for stealing credentials is to phish employees on mobile devices. Because smartphones and tablets are used for both work and personal reasons, employees can be targeted through multiple apps such as SMS, social media platforms, and third party messaging apps. The simplified user interfaces of a phone or tablet hide signs of phishing and make them ripe targets for socially engineered phishing campaigns.

VPNs enable lateral movement. Organizations rely on VPNs to give their employees remote access to resources, but this approach has a number of security shortcomings. First, VPN gives unlimited access to whoever connects, meaning anyone who gets in can freely get to any app in your infrastructure. Second, VPNs don’t evaluate the context under which users or devices connect. Context is necessary to detect anomalous activity that’s indicative of a compromised account or device.

Three Things You Can Do To Protect Against Ransomware

Ransomware attacks aren’t going anywhere. If anything, these threat actors have made their operations an enterprise, creating scalable, repeatable, and profitable campaigns. While there is no silver bullet to ransomware-proof your organization, there are a number of actions that can mitigate the risk.

  1. Protect your managed and unmanaged users. The first step to mitigating against ransomware is visibility into the risk level of devices and users to ensure they aren’t compromised. One compromised user or device can be detrimental to the security of the entire infrastructure. Hybrid work has forced organizations to introduce a bring-your-own-device (BYOD) model, which means unmanaged personal devices have access to sensitive data. These devices tend to be less secure than managed devices, so it’s critical that you have proper data controls in place.
  2. Implement granular and dynamic access controls. You need to move away from the all-or-nothing approach of VPNs. With users logging in from anywhere, it’s critical to understand the context under which they’re accessing your corporate apps and data. Applying the principle of Zero Trust will help you provide the right level of access to particular apps and only to the users who need it.
  3. Modernize your on-premises applications. Many organizations still have software that is hosted in data centers and accessible from the internet. To ensure they are secure, update them with cloud access policies that cloak the app – hiding them from the public internet but still enabling authorized users to access them from anywhere. Not only does this provide granular access controls, but it also extends the strong authentication security benefits that SaaS applications have and ensures no unauthorized users can discover and access your infrastructure.

Learn more about how your data security strategy should adapt to mitigate ransomware risk.

In a highly connected world, organizations need greater control over their data. A unified, cloud-centric platform allows you to do just that. Lookout’s SSE platform was recently named a Visionary by the 2022 Gartner Magic Quadrant for SSE. Lookout also scored in the top three for all SSE use cases in the 2022 Gartner Critical Capabilities for SSE.





TheHackersNews/

cyber security news

Post navigation

Previous Post: Iran to Shut Down Crypto Mining Farms Amid Record High Power Demand – Mining Bitcoin News
Next Post: New York’s Latest Bill Clamping Down On Bitcoin Mining Draws Sharp Criticism From Industry

Related Posts

  • Chinese ‘Gallium’ Hackers Using New PingPull Malware in Cyberespionage Attacks cyber security news
  • Watch Out! Hackers Begin Exploiting Recent Zyxel Firewalls RCE Vulnerability cyber security news
  • Log4Shell Still Being Exploited to Hack VMWare Servers to Exfiltrate Sensitive Data cyber security news
  • Here’s a New Tool That Scans Open-Source Repositories for Malicious Packages cyber security news
  • How to Improve Margins and Scale-Up Service Delivery cyber security news
  • Unpatched Critical Flaws Disclosed in U-Boot Bootloader for Embedded Devices cyber security news

Archives

  • July 2022
  • June 2022
  • May 2022

Categories

  • bitcoin news
  • cyber security news

Recent Posts

  • Cumberland Says Financially Burdened Crypto Firms Are ‘Hanging Over the Market Like a Cloud’ – Bitcoin News
  • Worst Quarterly Bitcoin Crash In A Decade Closes Above Key Support
  • Bitmain Launches 2,400 Megahash E9 Ethereum Miner Ahead of The Merge – Mining Bitcoin News
  • How This Company Lost 99% Of Its Clients Funds Shorting LUNA
  • NIST Announces First Four Quantum-Resistant Cryptographic Algorithms

Recent Comments

No comments to show.
  • Report Claims Samsung Is Producing 3nm ASIC Chips — Speculators Assume First Customer Is a Bitcoin Mining Rig Manufacturer – Bitcoin News bitcoin news
  • Cumulative NFT Sales Among 18 Blockchain Networks Surpass $36 Billion – Blockchain Bitcoin News bitcoin news
  • Blockchain.com Plans to Provide an NFT Domain Name to 83 Million Wallet Users – Blockchain Bitcoin News bitcoin news
  • Jamiroquai to Bring ‘Virtual Insanity’ to The Sandbox Blockchain Metaverse – Metaverse Bitcoin News bitcoin news
  • ETH, BTC Climb for Back-to-Back Sessions for First Time in Nearly 2 Weeks – Market Updates Bitcoin News bitcoin news
  • Virtual Currency-Based Sale Agreement an Invalid Contract, Chinese Court Rules – Regulation Bitcoin News bitcoin news
  • Singapore’s Deputy Prime Minister Advises Retail Investors to Steer Clear of Cryptocurrencies – Regulation Bitcoin News bitcoin news
  • Breaking Financial Shackles & Making Crypto Trading Easier bitcoin news

Copyright © 2022 Cyber Security And Bitcoin Blockchain News.

Powered by PressBook News Dark theme