Ransomware is back in the media, again. With destructive attacks continuing to impact governments, educational organisations and business operations in multiple states, countries & Continents, with Texas recently under fire with superior, advanced attacks.

 

Capital One was also an immense firm recently caught under siege from Ransomware.

Precise attacks can start in an abundance of unprecedented ways – some with a simplistic phishing email, others with hackers leveraging vulnerabilities in networks in order to jump onto other systems within the network. However, one of the most devastating ransomware attacks to happen in years, resulting in a worldwide disturbance, was when Capital One’s networks were exploited and vulnerabilities were blown wide open to the public.

Since the strike, new vulnerabilities have been identified, but there are still many networks out there that are highly susceptive to cyber-attacks.

Regrettably, many of these badly written networks are piled with issues that are easily ‘wormable’, which otherwise means hackers & malware can exploit these gaps in an automated method with no user interaction at all, enabling the malware to spread quickly and efficiently to a wide group of systems. In other words, taking over your entire infrastructure in a matter of moments.

 

Of course, deploying an industry-leading security product and operating a strict patch management strategy are the most beneficial practices. But there are also other best preparations you should consider to help keep ransomware, hackers & threats out of your network in the first place.

 

Your firewall provides indispensable protection against exploits by closing up or shielding vulnerable ports, as well as blocking attacks using an Intrusion Prevention System. IPS looks at network traffic for openings, exploits, and blocks any attempt for attackers to get through your network border or even cross boundaries & segments within your internal network.

Here are the firewall essentials to prevent ransomware attacks from getting into your Business network:

  • Reduce the surface area of attack: Review and revisit all port-forwarding rules to eliminate any non-essential open ports. Where possible use VPN to access resources on the internal network from outside rather than port-forwarding.
  • Introduce IPS protection: Apply proper IPS protection to the rules governing traffic to/from any Windows hosts on your network.
  • Reduce the risk of lateral movement: Protect against threats moving laterally on your network and consider segmenting your LANs into smaller sub-nets, assigning those to separate zones that are secured by the firewall. Apply suitable IPS policies to rules governing the traffic traversing these zones to prevent worms and bots from spreading between LAN segments.

Want to get the best solution for your business?

At iTeam, we take a security-first approach to technology – ensuring our client’s systems are best protected.

If you have any concerns, questions or simply want to explore how to better secure your business, please do get in touch with the team for a FREE demonstration, consultation to explore how exposed your business might actually be and identify actions to take.

To book a consultation or to arrange a further discussion, please get in touch via our form below, call 03330 507 690 or email Chris on cwatson@iteam.co.uk.

Share This