0% found this document useful (0 votes)
45 views

Ransomware Guide (Part 2)

This document provides tips to help prevent ransomware attacks, including implementing employee awareness training, regularly patching systems, restricting user permissions, scanning emails, disabling RDP, configuring firewalls, performing backups, and using application whitelisting. The tips are part of a ransomware prevention guide from Infosec United and Anti Ransom Patrol.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

Ransomware Guide (Part 2)

This document provides tips to help prevent ransomware attacks, including implementing employee awareness training, regularly patching systems, restricting user permissions, scanning emails, disabling RDP, configuring firewalls, performing backups, and using application whitelisting. The tips are part of a ransomware prevention guide from Infosec United and Anti Ransom Patrol.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Togheter we Conquer!

RANSOMWARE
GUIDE (PART 2)
A Infosec United & Anti Ransom Patrol
Collaboration

#infosecunited
Togheter we Conquer!

AWARENESS
TRAINING

#infosecunited
Togheter we Conquer!

BY IMPLEMENTING AN AWARENESS AND


TRAINING PROGRAM FOR ALL OF YOUR
EMPLOYEES (WE ARE CREATING A TRAINING
PLATFORM, STAY TUNED!).

#infosecunited
Togheter we Conquer!

PATCH YOUR
SYSTEM
REGULARLY

#infosecunited
Togheter we Conquer!

ALWAYS KEEP UP TO DATE YOUR OPERATING


SYSTEMS SOFTWARE AND FIRMWARE ON
DEVICES WITH THE LATEST PATCHES.

#infosecunited
Togheter we Conquer!

RESTRICT THE
USER
PERMISSIONS

#infosecunited
Togheter we Conquer!

YOU NEED TO RESTRICT THE USER


PERMISSIONS FOR INSTALLING AND RUNNING
SOFTWARE AND APPLICATIONS THAT ARE
FROM OTHER SOURCES.

#infosecunited
Togheter we Conquer!

SCAN THE EMAILS

#infosecunited
Togheter we Conquer!

SCAN ALL OF THE INCOMING AND


OUTCOMING EMAILS TO DETECT AND FILTER
THREATS SUCH AS PHISHING SPOOFING &
FILES.

#infosecunited
Togheter we Conquer!

DISABLE THE RDP

#infosecunited
Togheter we Conquer!

DISABLE THE REMOTE DESKTOP PROTOCOL


(RDP), WHICH IS NO BEING USED.

#infosecunited
Togheter we Conquer!

CONFIGURE
FIREWALLS

#infosecunited
Togheter we Conquer!

CONFIGURE YOUR FIREWALLS AND MAKE A


BLACKLIST, WITH THE KNOWN MALICIOUS IP
ADDRESSES.

#infosecunited
Togheter we Conquer!

BACKUPS

#infosecunited
Togheter we Conquer!

PERFORM REGULAR BACKUPS AND TEST THE


RESTORATION OF BACKUP FILES REGULARLY.

#infosecunited
Togheter we Conquer!

AND, PERFORM REGULAR SCANNING WITH


ANTIVIRUS ON THE COLD STORED BACKUPS,
TO PREVENT A POSSIBLE RE-INFECTION WITH
THE SAME RANSOMWARE.

#infosecunited
Togheter we Conquer!

DO AN
APPLICATION
WHITELISTING

#infosecunited
Togheter we Conquer!

THIS IS A LIST OF APPLICATIONS AND


COMPONENTS THAT ARE AUTHORIZED TO
EXECUTE ON YOUR SYSTEM (THAT'S WHY YOU
NEED TO DISABLE THE USERS PRIVILEGES)

#infosecunited

You might also like