Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Ingram Micro ONE 2019 News Juniper NXTWORK 2019 News Lenovo Newsroom Lexmark Newsroom NetApp Insight 2019 News Cisco Live Newsroom HPE Zone Intel Tech Provider Zone

10 Lessons Learned From The Biggest Ransomware Attacks

CRN asks technical leaders at IBM Security, Malwarebytes and Symantec about what organizations need to do differently going forward to avoid becoming the victim of ransomware attacks.

Back 1 ... 8   9   10   11   Next
photo

Prevention-Based Approaches Are More Important Than Ever

Prior to the rise of ransomware, the damage associated with malware or other security exploits was assumed to be relatively small and capable of being removed at any time, according to Malwarebytes's Kujawa. But now, Kujawa said businesses must have technology in place that keeps an eye out for new or emerging forms of ransomware.

Companies should leverage technology that looks for behaviors that match up with known ransomware activity by examining what each of the processes or threads in the system is doing. Kujawa said. If enough operations similar to ransomware activity are identified, a flag will be generated indicating the possibility of ransomware.

If the past, Kujawa said organizations that believed they had been infected with a virus might have run a free version of the security vendor's tool and assumed they're safe. But ever since the functionality of CryptoLocker became evident a half-decade ago, Kujawa said businesses are taking the security of their data much more seriously.

 
 
Back 1 ... 8   9   10   11   Next

sponsored resources