CISA guidance ransomware attacks.
Recently, the Cybersecurity and Infrastructure Security Agency (CISA) issued a fact sheet offering suggestions to government agencies and private companies on how to prevent and respond to a ransomware attack.
The fact sheet is entitled “Protecting Sensitive and Personal Information from Ransomware-Caused Data Breaches”. It provides organizations with tips to prevent and respond to ransomware. CISA encourages organizations to adopt a heightened state of awareness and implement the recommendations listed in this fact sheet. The goal is to reduce their risk to ransomware and protect sensitive and personal information. Review StopRansomware.gov for additional resources.”
The fact sheet includes tips such as maintaining an offline, encrypted back-up of data, develop an incident response plan, implement auditing, regular scans and software updates, block phishing attempts, and practice “good cyber hygiene.”
“Guidance from internationally respected institutions such as CISA on real and dangerous threats to our companies is of paramount importance.”, says Douglas Bernardini, Cyber Security Specialist and Cloud Computing Expert.
The guidance sets forth some examples of good cyber hygiene, including:
- Ensuring antivirus and anti-malware software and signatures are up to date.
- Implementing application allowlisting.
- Ensuring user and privileged accounts are limited through account use policies, user account control, and privileged account management.
- Employing MFA for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
- Implementing cybersecurity best practices from CISA’s Cyber Essentials and the CISA-MS-ISAC Joint Ransomware Guide.
The fact sheet also offers suggestions on the topics “Protecting Sensitive and Personal Information” and “Responding to Ransomware-Caused Data Breaches.”
Finally, it provides additional resources listed on the StopRansomware.gov website. This is a free and valuable roadmap for organizations to read and consider using to prepare for and respond to a ransomware attack.
See also: CISA MS-ISAC Ransonware Guide