Call: 806-350-8324

Mid-Year Security Report

Mon, 08/01/2016 - 17:46 -- Rachel Cunningham

"Cisco security researchers have turned their spotlight on ransomware, examining innovations that may cause this particular type of malware attack to become far more prevalent." What does this mean for the business world? It means that your standard firewall is no longer getting the job done. 

When it comes to cyber security, experts are constantly trying to find ways to stop hackers and other criminals from knocking down our walls and stealing all our most private and valuable data in order to make a profit. It's total cyber war out there and our enemies are getting smarter.  

Cisco’s newly released 2016 Midyear Cyber security Report (MCR) states that more sophisticated versions of ransomware may be on the horizon, and that organizations may not be fully prepared. Despite all the recent advances in threat detection and security, there are still many instances of poor defense infrastructures that are luring hackers. A few examples of these instances are outdated software, errors in code, sluggish detection rates and other vulnerabilities.

Thus, the birth of "Ransomware 2.0."

Ransomware 2.0 is the faster, smarter, more resilient for of ransomware that is not so easily detected by a solid back up & protection software. “Future ransomware attacks will evade detection by being able to limit CPU usage and refrain from command-and-control actions,” the report states. “These new ransomware strains will spread faster and self-replicate within organizations before coordinating ransom activities.”

A few things you can do to protect your business in the wake of this high tech battle:
• Instituting and testing an incident response plan that will enable a swift return to normal business operations following a ransomware attack
• Not blindly trusting HTTPS connections and SSL certificates
• Moving quickly to patch published vulnerabilities in software and systems, including routers and switches that are the components of critical Internet infrastructure
• Install upgrades and necessary patches as quickly as possible
• Educating users about the threat of malicious browser infections
• Understanding what actionable threat intelligence really is

Read the full report here:

Contact today if you need help creating a secure infrastructure for your business. 

Call Today: