| |February 201719CIOReviewExploit Prevention has the ability to stop ransomware from taking advantage of the weak spot in other software products· Application Whitelisting: Estab-lishes a "default deny" policy on servers so that only trusted applica-tions can run ­ stopping ransom-ware from gaining a foothold.· Stopping Email Threats: The Email Gateway is a primary defense against malicious emails carrying ransomware. The essential features to be present in order to avoid email threats are:· Anti-Spam/Anti-Virus Technol-ogy: Blocks ransomware emails, in-cluding those with booby-trapped macro attachments and stops other email-borne threats.· Time-Of-Click Protection: This is a truly defensive means to stops users from clicking on links to websites hosting ransomware, even if the link was safe when it entered the inbox.· Cloud-Sandboxing: By testing files in a safe environment before the user runs them, Cloud-Sandboxing catches zero-day threats including ransomware.· Stopping Web Threats: The Web Gateway blocks web-borne ransomware before it making way to user's endpoints. The essential feature to be attentive to includes;· URL Filtering: Blocks websites that are hosting ransomware and stops ransomware communicating with its command & control servers.· Web Filtering: Web Filtering, enforces strict controls on ransomware-related file types, stopping them from being downloaded.· Cloud-Sandboxing: By testing files in a safe environment before the user runs them, Cloud-Sandboxing catches zero-day threats including ransomware.Nine best security practices to apply now: Good IT security practices including regular training for employees are essential components of every single security setup. Make sure to follow these nine best practices:· Backup regularly and keep a recent backup copy off-line and off-site: With recent backups, data loss can be minimized. With the help of recent backup copy off-line and off-site, ransomware cannot get to it. · Enable file extensions: Enabling extensions makes it much easier to spot file types that would not commonly be sent to you and your users, such as JavaScript.· Open JavaScript (.JS) files in Notepad: Opening a JavaScript file in Notepad blocks it from running any malicious scripts and allows you to examine the file contents.· Don't enable macros in document attachments received via email: A lot of infections rely on persuading you to turn macros on, so don't do it!· Be cautious about unsolicited attachments: If you aren't sure ­ don't open it. Check with the sender if possible.· Don't have more login power than you need: Admin rights could mean a local infection becomes a network disaster.· Consider installing the Microsoft Office viewers: These viewer applications let you see what documents look like without opening them in Word or Excel.· Patch early, patch often: Ransomware exploitation can be stopped by timely rectification.· Stay up-to-date with new security features in your business applications: For example Office 2016 now includes a control called "Block macros from running in Office files from the internet".To stop ransomware exploitation it is critical to find the right protection. Use CryptoGuard technology to stop ransomware from encrypting your files. And also having the right anti-ransomware technologies at your email gateway, web gateway, firewall, and servers is essential to stop threats before they reach your endpoints. Together they give you the very best chance of stopping ransomware from holding your data ­ and your business ­ hostage.
< Page 9 | Page 11 >