\n
\nCyber-criminals using ransomware have begun to attack businesses more frequently, particularly small and medium-sized companies. This trend is confirmed by the IT Security Risks 2016 study from Kaspersky Lab and B2B International, during which 42% of respondents from small and medium-sized businesses agreed that cryptomalware was one of the most serious threats they faced last year.
\n
\nFor small companies, any data unavailability - however brief - can lead to significant losses, or bringtheir entire operations to a halt. If a company has not been taking due measures to ensure the safety of its important information, purchasing the decryption key from cyber-criminals can be the only way to recover data. However, this does not guarantee complete data recovery. The best way to protect your company from malware is to prevent the attack in the first place.
\n
\n\"Crypto-malware is becoming more and more serious threat, not only an organization losses money for ransoms but business can be paralyzed during files recovery. There is wide attack vector including web, mail, software exploits, USB devices, and others.\"
\n
\n\"To avoid infection, your personnel should explain where attacks come from and that employees should not open email attachments, visit untrusted web resources or plug USB devices into unprotected computers. Anti-malware solution is an essential measure to avoid majority security incidents,\" said Konstantin Voronkov, Head of Endpoint Product Management - Kaspersky Lab.
\n
\nKaspersky Lab experts recommend that small and medium-sized companies should follow several simple safety rules:
\n
\n#<\/strong> Make regular backup copies of all important files. Companies should have two backups: one in the cloud (for example Dropbox<\/a>, Google<\/a> Drive, etc.), and another on an additional server or on removable media if the data volume is not too big.
\n
\n#<\/strong> Trust well-known and respectful service providers who invest into security. Usually you can find security recommendations on their web-sites, they publish 3rd part security audits on cloud infrastructure. Don't assume cloud provider can't have security, availability or data leakage problems. Raise a question what do you do if security provider losses your data. There should be transparent data backup and restore processes together with data protection and access control.
\n
\n#<\/strong> Avoid using only free security and anti-malware software: small businesses expect the basic security tools offered within free solutions to be sufficient. Free tools do provide basic protection, but they fail to provide multi-layered security support. Instead, take a look at dedicated solutions: they do not require a large financial outlay, but deliver a higher level of protection.
\n
\n#<\/strong> Regularly update your OS, browser, antivirus, and other applications. Criminals use vulnerabilities in most popular software to infect user's devices.
\n
\n# <\/strong>Prevent IT emergencies - invite an expert to configure security solution for your company. Small businesses usually don't have an IT department or full-time dedicated administrator, they simply relyon the techiest person in the office to take care of the computers, in addition to his regular duties. Don't wait until something breaks, use IT support from an IT service provider to review your software and security configuration in advance.\n\n<\/body>","next_sibling":[{"msid":53269591,"title":"New cyber-control hub to check pornography, online trolls","entity_type":"ARTICLE","link":"\/news\/new-cyber-control-hub-to-check-pornography-online-trolls\/53269591","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":53269776,"entity_type":"ARTICLE","title":"Cyber attacks on corporate sector up six folds in 2015-16: Study","synopsis":"Cyber-criminals using ransomware have begun to attack businesses more frequently, particularly small and medium-sized companies.","titleseo":"telecomnews\/cyber-attacks-on-corporate-sector-up-six-folds-in-2015-16-study","status":"ACTIVE","authors":[],"Alttitle":{"minfo":""},"artag":"ETCIO","artdate":"2016-07-18 20:57:15","lastupd":"2016-07-18 21:01:17","breadcrumbTags":["Internet","Google","cyber attacks","Dropbox","Corporate Sector","Kaspersky Security Network"],"secinfo":{"seolocation":"telecomnews\/cyber-attacks-on-corporate-sector-up-six-folds-in-2015-16-study"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2016-07-18" data-index="article_1">
班加罗尔:根据基于卡巴斯基实验室报告卡巴斯基安全网络(KSN)数据,攻击的数量企业部门2015 - 2016,而2014 - 2015年增长6倍(从27000年到158000年)。因此,ransomware试图每十B2B用户加密的数据。
网络犯罪分子使用ransomware已经开始更频繁地攻击企业,尤其是中小企业。这种趋势证实了2016年的IT安全风险研究从卡巴斯基实验室和B2B国际,从中小企业中42%的受访者同意cryptomalware是他们面临的最严重威胁之一。
对于小公司来说,任何数据不可用——然而短暂——可能导致重大损失,或bringtheir整个操作停止。如果一个公司没有采取应有的措施,以确保安全的重要信息,采购网络罪犯的解密密钥可以恢复数据的唯一方法。然而,这并不能保证完整的数据恢复。保护公司免受恶意软件的最好方法是在第一时间阻止攻击。
“Crypto-malware越来越严重的威胁,不仅为赎金组织损失资金,业务可以在文件恢复瘫痪。有广泛的攻击向量包括web邮件,软件利用USB设备等等。”
“为了避免感染,你的人员应该解释攻击来自哪里,员工不应该打开电子邮件附件,不可信的网络访问资源或USB设备插入保护电脑。反恶意软件的解决方案是一项重要的措施来避免大多数安全事件,”康斯坦丁Voronkov表示端点产品管理——卡巴斯基实验室。
卡巴斯基实验室专家建议,中小企业应遵循几个简单安全规则:
#定期备份所有重要文件的副本。公司应该有两个备份:一个在云(例如Dropbox,谷歌驱动等),另一个在一个额外的服务器或可移动媒体,如果数据量不是太大。
#著名的信任,尊重服务供应商投资安全。通常在他们的网站,你可以找到安全建议他们发布第三部分云基础设施的安全审计。不要以为云提供商不能有安全、可用性或数据泄漏问题。提出问题你会怎么做如果安全提供者的损失数据。应该有透明的数据备份和恢复过程与数据保护和访问控制。
#避免使用只有自由的保障和反恶意软件软件:小型企业期望的基本安全工具提供在免费的解决方案是充分的。免费工具提供基本的保护,但他们未能提供多层次的安全支持。相反,看看专用解决方案:它们不需要大型金融支出,但提供更高层次的保护。
#定期更新您的操作系统、浏览器、杀毒软件和其他应用程序。罪犯利用漏洞最受欢迎的软件感染用户的设备。
#防止紧急情况,邀请专家为贵公司配置安全解决方案。小企业通常没有一个专门部门或专职管理员,他们只是依靠易怒的人在办公室里照顾电脑,除了常规的职责。不要等到打破的东西,用它支持从IT服务提供商提前回顾你的软件和安全配置。
网络犯罪分子使用ransomware已经开始更频繁地攻击企业,尤其是中小企业。这种趋势证实了2016年的IT安全风险研究从卡巴斯基实验室和B2B国际,从中小企业中42%的受访者同意cryptomalware是他们面临的最严重威胁之一。
对于小公司来说,任何数据不可用——然而短暂——可能导致重大损失,或bringtheir整个操作停止。如果一个公司没有采取应有的措施,以确保安全的重要信息,采购网络罪犯的解密密钥可以恢复数据的唯一方法。然而,这并不能保证完整的数据恢复。保护公司免受恶意软件的最好方法是在第一时间阻止攻击。
“Crypto-malware越来越严重的威胁,不仅为赎金组织损失资金,业务可以在文件恢复瘫痪。有广泛的攻击向量包括web邮件,软件利用USB设备等等。”
“为了避免感染,你的人员应该解释攻击来自哪里,员工不应该打开电子邮件附件,不可信的网络访问资源或USB设备插入保护电脑。反恶意软件的解决方案是一项重要的措施来避免大多数安全事件,”康斯坦丁Voronkov表示端点产品管理——卡巴斯基实验室。
卡巴斯基实验室专家建议,中小企业应遵循几个简单安全规则:
#定期备份所有重要文件的副本。公司应该有两个备份:一个在云(例如Dropbox,谷歌驱动等),另一个在一个额外的服务器或可移动媒体,如果数据量不是太大。
#著名的信任,尊重服务供应商投资安全。通常在他们的网站,你可以找到安全建议他们发布第三部分云基础设施的安全审计。不要以为云提供商不能有安全、可用性或数据泄漏问题。提出问题你会怎么做如果安全提供者的损失数据。应该有透明的数据备份和恢复过程与数据保护和访问控制。
#避免使用只有自由的保障和反恶意软件软件:小型企业期望的基本安全工具提供在免费的解决方案是充分的。免费工具提供基本的保护,但他们未能提供多层次的安全支持。相反,看看专用解决方案:它们不需要大型金融支出,但提供更高层次的保护。
#定期更新您的操作系统、浏览器、杀毒软件和其他应用程序。罪犯利用漏洞最受欢迎的软件感染用户的设备。
#防止紧急情况,邀请专家为贵公司配置安全解决方案。小企业通常没有一个专门部门或专职管理员,他们只是依靠易怒的人在办公室里照顾电脑,除了常规的职责。不要等到打破的东西,用它支持从IT服务提供商提前回顾你的软件和安全配置。
评论
现在评论 阅读评论(1)所有评论
找到这个评论进攻?
下面选择你的理由并单击submit按钮。这将提醒我们的版主采取行动