Le Lézard
Classified in: Science and technology
Subject: PSF

Island Tech Services (ITS) Offers Guidance to Businesses on Avoiding Ransomware Attacks


RONKONKOMA, N.Y., Jan. 23, 2018 /PRNewswire/ -- One of the biggest threats to business operations isn't a competitor or new technology ? it's a cybersecurity threat called ransomware. Ransomware attacks can occur at any time to businesses large or small, usually through email. Once an attack has been executed, it can take a day or two to see its effects on your network. And by then it is too late. "A ransomware attack typically goes undetected until it has caused significant damage in the form of business downtime and data loss," says Peter Xenakis, Regional Sales Manager and an IT security expert at Island Tech Services (ITS) (www.itsg.us.com), a leading provider of advanced technology, mobility and vehicle solutions. Companies that have fallen victim to a ransomware attack are then faced with a series of unplanned financial decisions, including temporary business closure, downtime for data recovery or ? in extreme cases ? paying a hefty ransom to unlock their data. The latter choice is not always clear. "Payment of a ransom does not always guarantee that the business will receive the codes necessary to unlock their data. Even when they do get the proper codes, the business is then faced with the time-consuming task of unencrypting data ? one file at a time," says Xenakis. ITS has identified Four Steps Businesses Can Take to Protect from Ransomware.

ITS Ransomware Image January 2018

Ransomware Primer
Ransomware follows a standard process. First, it is introduced into a network, usually through an email phishing scheme where an unwary employee clicks on a link that downloads an executable malware file to the network. These phishing emails are difficult to avoid without proper training. They masquerade as typical emails and are often difficult to discern from actual email traffic.

Once activated, the malware begins to encrypt all files to which it has access, including files on network drives. It also infects other connected workstations and they begin to act in concert ? encrypting all the files stored within an organization's servers.

As the ransomware encrypts files, users notice that their systems appear to work more slowly or that they are unable to access files they had been working on just days or hours before. By the time IT has been notified, the damage is done. At some point, clicking on an encrypted file brings up a website for a "decryption service" offering to recover the files ? for a price.

"Ransomware tends to cross over backup or recovery points as it is slowly encrypting files," says Xenakis. "This results in unencrypted and encrypted files both being backed up."

At this point, companies often must go back many days to locate an unencrypted full backup or "good version" that does not include any encrypted files. Even when they do, many organizations have not properly created enough recovery points to limit the damage. Instead, they then face the challenge of recovering massive amounts of data which takes a great deal of time.

Four Steps Businesses Can Take to Protect from Ransomware
Xenakis says that proper employee training is the key to avoiding or mitigating the threat of ransomware. He recommends companies follow a four-step Security Awareness Training Program:

  1. Appoint a Cyber Cop. Dedicate someone in each office to be involved in the IT security process. This person doesn't need to be an IT staffer, but should be an employee who can coordinate training and testing with other employees. For example, healthcare organizations are required to designate someone as HIPAA compliance security officer.
  2. Conduct Regular Training. Formal and ongoing security training ? preferably a video training program ? is required for organizations of all sizes to ensure employees are vigilant about security threats. "Employees need to be trained how to identify, avoid and report any phishing scheme," says Xenakis. "The No. 1 threat vector for ransomware is employee email."
  3. Test Your Employees. Random testing of employees ensures they are following the training they have received and may indicate weaknesses. Organizations can use specific tools or create their own phishing campaigns to test for awareness and vulnerabilities.
  4. Audit & Log Your Training & Tests. By properly auditing and logging your training and testing, you can ensure that employees have participated in the regular training and are prepared. "No one is above the training," says Xenakis. "Not even the CEO."

"The key to a strong Security Awareness and Training Program is that it is ongoing ? repeated and updated to reflect new lessons ? and that everyone in the organization, including existing and new employees, receives the exact same training," says Xenakis.

Want to Learn More?

About Island Tech Services
Island Tech Services (ITS) (www.itsg.us.com), is a leading provider of advanced technology, mobility and vehicle solutions to business professionals, first responders and public-sector employees throughout the country. For nearly 20 years, we have helped customers incorporate technology in their work to increase performance, efficiency and security. Our comprehensive and integrated technologies and services span from headquarters, to field techs, to command vehicles. For more information about ITS, please contact us at 888-614-2770 or visit http://www.itsg.us.com/

MEDIA CONTACT:                                          
Lisa Hazen, Communication Strategy Group; 631-239-6335 x103; [email protected]

SOURCE Island Tech Services


These press releases may also interest you

at 08:40
The "Cell and Gene Therapies in CNS Disorders" report has been added to ResearchAndMarkets.com's offering. The analyst anticipates that the global CGT market value in CNS disorders will experience significant growth - sales are expected to increase...

at 08:38
On September 23, 2007, Dr. Shanea Clancy's life took a dramatic turn, when at 21 years of age, she found herself embroiled in a nationally covered, unprecedented EMS case where she was driving an ambulance that was involved in a crash that killed two...

at 08:32
Serial entrepreneur and board member Dave Parker has joined the Entrepreneurs' Organization (EO) as its next Chief Executive Officer. The Seattle, U.S.-based leader brings more than three decades of experience as both founder and board director for...

at 08:30
Servotronics, Inc. , a designer and manufacturer of servo-control components and other advanced technology products, today reported financial results for the first quarter ended March 31, 2024....

at 08:30
ePlus inc. today announced that it has been named Growth Partner of the Year by Varonis. ePlus was selected because of its demonstrated ability to leverage its deep knowledge of Varonis technology while helping organizations maximize the value from...

at 08:21
In the heart of San Francisco, where creativity meets technology, Smack Happy Design unveils a passion project that reimagines the art show. A pioneering virtual gallery experience, The Smack Happy Curated Art Show curated by Smack Happy Design...



News published on and distributed by: