Adarma Ransomware Webinar: One Click and You’re Toast Right?
Adarma’s new Ransomware Readiness report (download here) recently found that 58% of UK businesses with more than 2000 employees have suffered a ransomware attack. A staggering 67% of those victims confirmed they had paid the ransom, with 94% reporting they are either concerned or very concerned about the threat.
Recently published research from Tenable found that ransomware accounted for 43.4% of all attacks across EMEA in 2021, suggesting that organisations are right to be worried about being targeted by ransomware criminals.
However despite these figures, a surprising 96% of respondents to Adarma’s survey said they were confident in their ability to respond to a ransomware attack, even though 22% said they had no ransomware incident response plan in place.
Given the rising number of attacks and this confusing combination of over-confidence paired with lack of preparedness, Adarma decided to host, in partnership with Tenable, a webinar focused on debunking common misconceptions about ransomware.
Our speakers David Calder, chief product officer at Adarma and Bernard Montel technical director EMEA / security strategist at Tenable shared their insights and advice on how ransomware operates and how to respond to an ongoing attack in order to limit the its harm to the organisation.
Here are 5 key points that David and Bernard recommend you consider when preparing for a ransomware attack.
1 – Phishing emails are not the only vector that a ransomware attacker might use to gain the initial foothold. Other access methods include unpatched software, misconfigured systems or using credentials that have been acquired in other ways.
2 – If a ransomware attack has started then cutting the pathways the perpetrators are using is one way to mitigate propagation, but it’s vital that when you detect an attack you don’t reveal to the attackers they’ve been detected. The more you hide, the better you can react accordingly otherwise they might launch another attack.
3 – View cloud as an opportunity to introduce chokepoints that can be protected and consider where network segregation can be deployed.
4 – Plan how you will collaborate and communicate as a team if your systems and devices have been compromised by an attacker. You do not want to reveal your response to your attackers.
5 – Don’t ignore the human element of your response plan. People will be pulling exceptionally long shifts and face an enormous amount of pressure. Leaders need a to know in advance how they will support their team and ensure they don’t burn out.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
3rd Party Cookies
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!