CISA publishes guidelines on the avoidance of ransomware leaks

The document contains advanced methods of preventing attacks of extortionists and protection of confidential information.

The US Agency for Cybersecurity and Infrastructure Security Agency (CISA) has issued a guide to help public and private organizations prevent data leaks from cyber attacks by extortionists.

The CISA document contains advanced methods of preventing attacks by extortionists and protecting confidential information from attempts to steal. The Federal Agency issued recommendations in response to the use of the extortion groups of the stolen data as a bargaining tool in the ransom negotiations. Criminalers are threatening the victims with publishing stolen information on special sites of data leaks if the affected company does not pay the ransom.

According to the recommendations for the prevention of attacks of extortionists, the organizations at risk should:

Support offline encrypted backups and regularly test backups.

Create, maintain, and implement a baseline response plan for cyberincidents, the failover plan and its associated communication plan;

Eliminating vulnerabilities and misconfigurations to reduce the attack vector;

Reduce the risk of phishing phishing letters to the end users by including reliable spam filters and introducing user awareness and training programs.

Follow the rules of cyber-hygiene (use modern anti-malware solutions and list of allowed applications, enable multi-factor authentication and limit the number of privileged accounts).

To prevent access of extortionists to confidential or personal information from customers or employees of CISA, recommend:

Introduce cutting-edge physical security practices;

Implement advanced methods of cybersecurity (not store sensitive data on devices available on the Internet, encrypt sensitive information in storage and transmission, use internetwork screens and network segmentation)

Post a Comment

Previous Post Next Post