Story image

Six practical steps you can take to avoid being hit by another WannaCry

14 Jun 2017

WannaCry is last week’s news. Around a quarter of a million computers affected, in more than 150 countries. But it’s all over now – until next time. And there will be a next time. Ransomware is not a new category of threat, and the value of bitcoin payments by victims made to its creators will surely encourage more.

The question the rest of us face is, what precautions should we take now?

#1 It’s about people

Most ransomware attacks rely on users clicking on a link that will open a malicious attachment. Setting policies is important. (“Employees are reminded that it is their responsibility to ensure that they do not carelessly open any link or attachment that may threaten the security of the company’s IT systems”) But policies aren’t enough. Spend time making sure your users understand security basics. Remind them frequently. Send them examples. Get them to spot the malicious link. Make up quizzes.

#2 Block the cracks

If you want to keep out the wind you have to plug all the cracks. Think email, web, removable devices. Good web and email filtering solutions are important, particularly web, because it protects your network against malware coming in via both websites and web-based emails. Make sure the tools you use don’t just rely on signatures: they should employ heuristics and artificial intelligence to analyse user and network behaviour, detect sophisticated threats and stop zero day attacks.

#3 Keep everything current

Apply software updates and patches as they arrive. Run regular vulnerability scans and patch your operating system before attackers identify it. (Wannacry exploited a Windows vulnerability that was patched two months before the malware was released in the wild.)

#4 Back it up

Schedule backups based on the system’s criticality: the more critical the system, the more frequently you should back it up. Have a robust Disaster Recovery Plan and work out your Recovery Point Objectives: how much data can you afford to lose? – and Recovery Time Objectives: how soon do you want the system back running to limit the impact on your business?

#5 No chocolates

Forrest Gump would recognise that most IT networks are like a box of Roses chocolates: hard on the outside, soft in the middle. Once an attacker gets into the system, everything gets infected. To protect your assets you need to segment your assets based on how critical they are. If you have legacy PCs running Windows XP (which is no longer being patched), isolate them from your other systems using microsegmentation principles. These are relatively easy to apply.

#6 “… and that’s why you can’t install your own software”

You don’t hand the keys to the car, the liquor cabinet and the gun rack to a 16 year old. Allowing all users to have blanket local admin access is almost as bad an idea. Because malware can often only execute on a machine using the privileges of the logged on user. So limit user privileges: self-service installation is not a right. 

Article by Ashwin Pal, Unisys director of security services, Asia Pacific.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.