Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

Togheter we Conquer!

RANSOMWARE
GUIDE (PART 2)
A Infosec United & Anti Ransom Patrol
Collaboration

#infosecunited
Togheter we Conquer!

AWARENESS
TRAINING

#infosecunited
Togheter we Conquer!

BY IMPLEMENTING AN AWARENESS AND


TRAINING PROGRAM FOR ALL OF YOUR
EMPLOYEES (WE ARE CREATING A TRAINING
PLATFORM, STAY TUNED!).

#infosecunited
Togheter we Conquer!

PATCH YOUR
SYSTEM
REGULARLY

#infosecunited
Togheter we Conquer!

ALWAYS KEEP UP TO DATE YOUR OPERATING


SYSTEMS SOFTWARE AND FIRMWARE ON
DEVICES WITH THE LATEST PATCHES.

#infosecunited
Togheter we Conquer!

RESTRICT THE
USER
PERMISSIONS

#infosecunited
Togheter we Conquer!

YOU NEED TO RESTRICT THE USER


PERMISSIONS FOR INSTALLING AND RUNNING
SOFTWARE AND APPLICATIONS THAT ARE
FROM OTHER SOURCES.

#infosecunited
Togheter we Conquer!

SCAN THE EMAILS

#infosecunited
Togheter we Conquer!

SCAN ALL OF THE INCOMING AND


OUTCOMING EMAILS TO DETECT AND FILTER
THREATS SUCH AS PHISHING SPOOFING &
FILES.

#infosecunited
Togheter we Conquer!

DISABLE THE RDP

#infosecunited
Togheter we Conquer!

DISABLE THE REMOTE DESKTOP PROTOCOL


(RDP), WHICH IS NO BEING USED.

#infosecunited
Togheter we Conquer!

CONFIGURE
FIREWALLS

#infosecunited
Togheter we Conquer!

CONFIGURE YOUR FIREWALLS AND MAKE A


BLACKLIST, WITH THE KNOWN MALICIOUS IP
ADDRESSES.

#infosecunited
Togheter we Conquer!

BACKUPS

#infosecunited
Togheter we Conquer!

PERFORM REGULAR BACKUPS AND TEST THE


RESTORATION OF BACKUP FILES REGULARLY.

#infosecunited
Togheter we Conquer!

AND, PERFORM REGULAR SCANNING WITH


ANTIVIRUS ON THE COLD STORED BACKUPS,
TO PREVENT A POSSIBLE RE-INFECTION WITH
THE SAME RANSOMWARE.

#infosecunited
Togheter we Conquer!

DO AN
APPLICATION
WHITELISTING

#infosecunited
Togheter we Conquer!

THIS IS A LIST OF APPLICATIONS AND


COMPONENTS THAT ARE AUTHORIZED TO
EXECUTE ON YOUR SYSTEM (THAT'S WHY YOU
NEED TO DISABLE THE USERS PRIVILEGES)

#infosecunited

You might also like