{"id":20684,"date":"2022-11-28T13:20:55","date_gmt":"2022-11-28T21:20:55","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/11\/28\/news-14417\/"},"modified":"2022-11-28T13:20:55","modified_gmt":"2022-11-28T21:20:55","slug":"news-14417","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/11\/28\/news-14417\/","title":{"rendered":"Best Practices for Securing Your Network from Ransomware"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/11\/Ransomware-image.png\"\/><\/p>\n<p><strong>Credit to Author: alexandra.hamer@sophos.com| Date: Mon, 28 Nov 2022 18:55:50 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p><span data-contrast=\"auto\">66% of organizations were hit by ransomware last year*<\/span><span data-contrast=\"auto\">\u00a0demonstrating that adversaries have become considerably more capable at executing attacks at scale than ever before.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Modern attacks leverage legitimate IT tools such as Remote Desktop Protocol (RDP) to gain access to networks, making initial detection notoriously difficult. The root of the problem is that there\u2019s too much implicit trust in the use of these tools which has repeatedly proven unwise.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Implementing robust network security measures is a sure-fire way to mitigate this risk. In our new whitepaper, <\/span><a href=\"https:\/\/www.sophos.com\/en-us\/whitepaper\/secure-your-network-from-ransomware\"><span data-contrast=\"none\">Best Practices for Securing Your Network from Ransomware<\/span><\/a><span data-contrast=\"auto\">, and in this article, we share practical network security tips to help elevate your ransomware protection.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><strong>1. Micro-segment your network<\/strong><\/h3>\n<p><span data-contrast=\"auto\">Micro-segmenting allows you to limit the lateral movement of threats. One way to achieve this is to create small zones or VLANs and connect them via managed switches and a firewall to apply anti-malware and IPS protection between segments. This lets you identify and block threats attempting to move laterally across your network.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\"><b>2. Replace remote-access VPN with a Zero Trust Network Access solution (ZTNA)<\/b><\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"><b>\u00a0<\/b><\/span><\/h3>\n<p><span data-contrast=\"auto\">ZTNA is the modern replacement for remote-access VPN. It eliminates the inherent trust and broad<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"auto\">access that VPN provides, instead using the principles of Zero Trust: trust nothing, verify everything. To learn more about the benefits of ZTNA over VPN, <\/span><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/08\/10\/ztna-vs-remote-access-vpn\/\"><span data-contrast=\"none\">read our article here<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>3. Implement the strongest possible protection<\/h3>\n<p><span data-contrast=\"auto\">Always deploy the highest level of protection on your firewall, endpoints, servers, mobile devices, and remote access tools. In particular:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ensure your firewall has TLS 1.3 inspection, next-gen IPS, and streaming DPI with machine learning and sandboxing for protection from the latest zero-day threats<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ensure your endpoints have modern next-gen protection capabilities to guard against credential theft, exploits, and ransomware<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<h3>4. Reduce the surface area of cyberattacks<\/h3>\n<p><span data-contrast=\"auto\">We recommend that you review your firewall rules and eliminate any remote access or RDP system access through VPN, NAT, or port-forwarding, and ensure that any traffic flows are properly protected. Eliminating exposure from remote access goes a long way in reducing the number of in-roads for attackers to launch ransomware attacks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><strong>5. Keep your firmware and software patched and up-to-date\u00a0<\/strong><\/h3>\n<p><span data-contrast=\"auto\">This is important for both your network infrastructure (such as your firewall or remote-access software or clients) and your systems given that every update includes important security patches for previously discovered vulnerabilities.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>6. Use multi-factor authentication (MFA)<\/h3>\n<p><span data-contrast=\"auto\">Ensure your network operates on a zero-trust model where every user and device has to continually earn trust by verifying their identity. Also, enforce a strong password policy and consider adopting authentication solutions like Windows Hello for Business.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>7. Instantly respond to cyberattacks<\/h3>\n<p><span data-contrast=\"auto\">Use automation technologies and human expertise to accelerate cyber incident response and remediation. Ensure your network security infrastructure helps you automatically respond to active attacks so you can isolate a compromised host before it can cause serious damage.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">An increasingly popular way to achieve this is via a managed detection and response (MDR) service. MDR is a fully managed, 24\/7 service delivered by experts who specialize in detecting and responding to cyberattacks that technology solutions alone cannot prevent.\u00a0 To learn more on the benefits of MDR, <\/span><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/09\/29\/top-five-reasons-to-use-mdr-services\/\"><span data-contrast=\"none\">read our article here.<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>Learn more<\/h2>\n<p><span data-contrast=\"auto\">To explore these best practices in greater detail and to learn how Sophos network security solutions elevate your ransomware protection, <\/span><a href=\"https:\/\/www.sophos.com\/en-us\/whitepaper\/secure-your-network-from-ransomware\"><span data-contrast=\"none\">download our whitepaper here<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Sophos provides everything you need to fully secure your network from attacks, including firewalls, ZTNA, switches, wireless, remote-edge devices, messaging protection, MDR, next-gen endpoint protection, EDR and XDR. Plus, everything\u2019s managed via a single cloud management console \u2014 Sophos Central \u2014 and works together to deliver Synchronized Security and cross-product threat detection and response.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For more information and to discuss how Sophos can help you, speak with one of our advisors or visit <\/span><a href=\"http:\/\/www.sophos.com\/\"><span data-contrast=\"none\">www.sophos.com<\/span><\/a><span data-contrast=\"auto\"> today.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>* The State of Ransomware 2022, Sophos<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/11\/28\/best-practices-for-securing-your-network-from-ransomware\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/11\/Ransomware-image.png\"\/><\/p>\n<p><strong>Credit to Author: alexandra.hamer@sophos.com| Date: Mon, 28 Nov 2022 18:55:50 +0000<\/strong><\/p>\n<p>Discover the seven network security measures that can help mitigate the risk of a ransomware attack. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10384,24562,3765,24567,24563],"class_list":["post-20684","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-network","tag-products-services","tag-ransomware","tag-sophos-firewall","tag-sophos-ztna"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20684"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20684\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20684"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}