foreword
In view of the endless information security problems caused by ransomware (Ransomware) for enterprises and companies, the US government recently issued a letter to US enterprises, which mentioned that protecting the privacy of private individuals and the public is the most important thing for the current president. Enterprises should take the issue of information security seriously, and must understand that once they become the target of an attack, it is difficult to escape, so some protection must be carried out immediately!
The following are excerpts from this letter to give 5 safety tips
5 safety tips
regular backup
Back up your data regularly, and test offline too: Make sure that the data is backed up regularly, and it is in an offline environment to ensure that the ransomware cannot easily modify and delete the data, and it can also restore the system after the extortion. Backup is also a very important first step in information security.
update system
Instantly update and fix the system: This includes operating system security, applications, and firmware. Any missing item may become a breach in information security, so regular updates are very important.
test strain gauge
Emergency Response Measures in the Event of Exercise Problems: Preventive measures and things that need to be dealt with when they actually happen need to be actually implemented. For example, when all the systems cannot be used, can the company still produce operations? How long it can be maintained, these must be considered.
Check and test safety systems
Check your security measures: Use a third-party penetration test to test the security of the system to see if there are still unknown security loopholes. After all, your own security team may still have some blind spots that are not noticed. It is the most appropriate way to have a third-party inspection.
Segmenting the network to diversify risks
Separate your operational network: Ransomware has recently tended to shift from stealing data to disrupting and disrupting company workflows. Therefore, it is very important to distinguish between network authorizations for manufacturing and production operations to ensure that when some network information security is compromised At the same time, part of the business can continue to operate without paralyzing the operation of the company.
source
Memo – What We Urge You To Do To Protect Against The Threat of Ransomware – DocumentCloud