Shield Your Business From The Next “Petya”

Cybercrime vulnerabilities are a major concern to businesses and individuals today more than ever before. The Petya ransomware that completely paralyzed business operations in a number of big firms in Europe, Middle East and the US last week evidenced the proposition that ransomware, especially, is quickly becoming the “universal public enemy number one”.

Ransomware is a type of a cyberattack conducted through malicious software that locks a digital device and demands a ransom to unlock it.

Some cyber security analysts have termed the Petya cyberattack as one of the biggest ransomware attacks ever recorded. It has left more than 100,000 systems infected, a majority of them being located in Ukraine according to a Kaspersky Labs report.

The effect of the Petya cyberattack has spilled over to other countries and scores of systems in almost 100 countries are at a risk of infection as of now.


Here’s your ransomware shield

As a business manager, it’s time to seriously consider integrating cyber security solutions in the organization’s strategy. One of the major factors to consider when choosing a highly effective cyberattack solution is security configuration.

A big percentage of recent cases of cyber security breaches have been associated with attackers using automated scanners to manipulate security misconfiguration. A cybersecurity solution that addresses this vulnerability is, therefore, of great defensive value in light of the current trend of cyberattack cases.

Security configuration mechanisms

A reliable cybersecurity solution will address critical encryption issues including: 1. Input validation – As a method of untrusted user input sanitization, input validation prevents various types of web application security defects such as command injection, SQLi, and XSS. Conversely, lack of input validation can provide an attacker an opportunity to hijack a site and steal databases.

  1. Proper policy and role configuration – This involves establishing role-based access controls as well as implementing system logging role-based access controls to network resources. This limits individual users’ ability or attackers’ trials to reach parts of the systems or files that they should not access.
  2. Application whitelisting – Whitelisting involves generating an index of software applications that are approved or permitted to run on a computer system. Any other application, including malicious software, is blocked from running and this helps to protect the systems and networks from harmful applications. It works best where systems are subjected to a consistent workload, especially in centrally managed environments.
  3. Patching operating systems and applications – Always keeping the system and applications updated is an often forgotten yet crucial security configuration that ensures all known application flaws are patched. It’s important to remember to follow best practices when updating software and this includes only downloading updates and patches from authenticated vendors.

Other basic web security measures that every internet user ought to always remember include backing up data, using anti-virus software and firewalls, and being careful when opening emails. Cybersecurity vigilance both at individual and business levels can never be overemphasized.

When security configuration is flawless, the risk of falling victim to a ransomware attack is greatly reduced.

By Joe

Phoenix-Guard Technical Writer.




Leave a Reply

1 Comment on "post1"

Notify of
Sort by:   newest | oldest | most voted