logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
20th October 2017 by CyberVision 0 Comments 965 Views
20th October 2017 by CyberVision in Business Security

RANSOMWARE: HOW TO PREDICT, PREVENT, DETECT & RESPOND 

 

 

Ransomware is one of the most prominent cyber threats today. Yet just like any other threat, F-Secure advocates for a four-phase approach to cyber security – Predict, Prevent, Detect, and Respond – that can help an organisation defend against, cope with or recover from a ransomware incident.

 

This form of crimeware used either by an individual or by organised criminal groups, extorts money from an affected user. These malicious programs take control of a user’s device or data and then demands payment to restore normal access to the ransomed content or system.

 

Ransomware attacks have attracted a significant amount of coverage in the mainstream media over the last few years, as major companies and organisations announced that their operations had been affected by the threat. Examples of affected businesses include hospitals, universities and major international corporations. Despite the alarming nature of the threat, the way ransomware gains entry onto a user’s device is actually no different from the methods used by other threats.

 

Ransomware is most commonly spread by two methods: Email messages that trick users into opening a malicious file attachment, or Exploit kits that silently download the threat onto the user’s device while they are visiting a website. These pathways onto the user’s device are relatively predictable, and can be successfully identified and defended. This requires identifying potential weaknesses in the device and setting the appropriate safeguards in place, both to block any potential intrusion attempts and to raise the alarm if any penetration does occur.

 

F-secure’s four-phase approach also means that even in the event that a threat does manage to bypass protective measures, all is not lost. The affected device can still be identified and isolated, so that the damage can be contained. The findings from a forensic investigation of the device can then be used to further improve the organization’s infrastructure, hardening it against future incidents.

 

Would you like to know if you’re adequately protecting your business’ network? Click on this link to find out more.

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cybersecurity
  • Detect
  • f-secure cyber security
  • Predict
  • Prevent
  • ransomware
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo