{"id":16126,"date":"2019-08-21T05:20:55","date_gmt":"2019-08-21T13:20:55","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/21\/news-9869\/"},"modified":"2019-08-21T05:20:55","modified_gmt":"2019-08-21T13:20:55","slug":"news-9869","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/21\/news-9869\/","title":{"rendered":"Everything is bigger in Texas, including ransomware attacks"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/shutterstock_796836652.jpg\"\/><\/p>\n<p><strong>Credit to Author: Doug Aamoth| Date: Wed, 21 Aug 2019 12:54:28 +0000<\/strong><\/p>\n<div class=\"entry-content\" width=\"100%\" height=\"420\">\n<p>Texas is big. Really big. With 29 million residents it\u2019s the second largest state in America, has a land mass twice the size of Germany, and a GDP larger than Russia. Texans like to say, \u201ceverything is bigger in Texas\u201d, and usually that is a good thing. However, this time bigger isn\u2019t better.  <\/p>\n<p>News hit this week that <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/21\/ransomware-disrupts-22-texas-government-departments\/\">22 government organizations<\/a> in the Lone Star State were recently hit by coordinated ransomware attacks. It\u2019s a stark reminder that as attacks continue to evolve, it\u2019s crucial that your defenses evolve even faster. <\/p>\n<h2>Ask about these three big, protective layers against advanced attacks<\/h2>\n<p>So how can you help ensure your organization isn\u2019t the next ransomware victim?<\/p>\n<p>For starters, does your solution have industry-leading anti-exploit technology to ensure attackers can\u2019t use unpatched, vulnerable software programs to distribute and install ransomware? <\/p>\n<p>Sophos <a href=\"https:\/\/www.sophos.com\/en-us\/products\/intercept-x.aspx?cmp=26104\">Intercept X Advanced<\/a> blocks more exploit techniques than any other endpoint protection product on the market. It\u2019s not enough to just have exploit protection: the number of exploit techniques a product protects against is also extremely important. Luckily, if it can be exploited, Intercept X Advanced has the best chance of neutralizing it.<\/p>\n<p>Should that not stop an attack \u2013 or should an exploit not be leveraged \u2013 how will your solution stop attacks it\u2019s never seen before? <\/p>\n<p>Our award-winning Deep Learning engine can identify unknown, unseen, and previously unidentifiable executables with greater accuracy than \u2013 you guessed it \u2013 <a href=\"https:\/\/news.sophos.com\/en-us\/2019\/03\/05\/intercept-x-tops-nss-labs-advanced-endpoint-protection-aep-security-value-map\/\">any other vendor on the market<\/a>. <\/p>\n<p>And finally, should the unthinkable happen \u2013 should ransomware find its way onto one of your endpoints and start executing \u2013 how will your solution deal with it? <\/p>\n<p>The second-to-none CryptoGuard anti-ransomware technology found in Intercept X Advanced not only offers the best ransomware protection on the planet to stop attacks in their tracks, but also uses proprietary shadow-copy technology to roll affected files back to their previously-safe states, and cleans up affected registry entries \u2013 all in the blink of an eye. It\u2019s not enough to just stop a ransomware attack: it needs to be reversed and cleaned up as well, so you can get on with your day.<\/p>\n<p>These are just three of the ways that Intercept X can thwart an attack, all backed up by a <a href=\"https:\/\/www.sophos.com\/en-us\/products\/intercept-x\/tech-specs.aspx?cmp=26104\">very long list<\/a> of pre-execution, runtime, and post-execution features. <\/p>\n<h2>Seeing is believing<\/h2>\n<p>Here\u2019s a closer look at what happens when a popular ransomware variant tangles with Intercept X technology:<\/p>\n<div class=\"embed-vimeo\" style=\"text-align: center;\"><iframe loading=\"lazy\"  src=\"https:\/\/player.vimeo.com\/video\/346438544\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/div>\n<h2>Take it for a spin<\/h2>\n<p>Of course, the best way to experience the power of Intercept X Advanced is to try it yourself. <a href=\"https:\/\/secure2.sophos.com\/en-us\/products\/intercept-x\/free-trial.aspx?cmp=26104\">Download a free 30-day trial<\/a>, and you\u2019ll be up and running in minutes. Evolve your defenses today!<\/p>\n<\/p><\/div>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/sophos\/dgdY\/~3\/I5Rz6ay9jvY\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/shutterstock_796836652.jpg\"\/><\/p>\n<p><strong>Credit to Author: Doug Aamoth| Date: Wed, 21 Aug 2019 12:54:28 +0000<\/strong><\/p>\n<p>Bigger isn&#8217;t always better.&lt;img src=&#8221;http:\/\/feeds.feedburner.com\/~r\/sophos\/dgdY\/~4\/I5Rz6ay9jvY&#8221; height=&#8221;1&#8243; width=&#8221;1&#8243; alt=&#8221;&#8221;\/&gt;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10379,10405,19712,3765,12231,997],"class_list":["post-16126","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-corporate","tag-intercept-x","tag-intercept-x-advanced","tag-ransomware","tag-sophos-products","tag-texas"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16126"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16126\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16126"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}