Electronic Health Records

Four Countermeasures to Protect Against Ransomware

Posted on

Sponsored by: Trend Micro Incorporated

By now, not only security professionals, but also many knowledge workers and consumers are well aware of the insidious nature of ransomware. As its name implies, ransomware is malicious software that holds data files hostage pending the payment of a ransom, typically with untraceable bitcoin as the currency of choice. Ransomware encrypts a series of files preventing access to those files. Absent the victim’s ability to restore a backup, the hacker holds the encryption keys required to access the files until the ransom demand is met.

Organizations must treat mitigating the risks associated with ransomware—data loss, interruption of business operations, and more—as a strategic imperative by implementing a layered security approach that maps to and thus thwarts ransomware attack campaigns. This paper offers a prescriptive approach to do so based on four countermeasures requiring a set of integrated controls for centralized visibility, shared intelligence, and active prevention.

Please enter your email address to access this resource

Trouble Downloading? Email .(JavaScript must be enabled to view this email address)
You can view our privacy policy here.