Page 18 - Cyber Warnings
P. 18







4. Ransomware: If you can’t stop, make sure you can spot it. There still is no such thing as
100% security, so while your emphasis will be on prevention, accept that detection of a
breach is going to be a necessary contingency.


This is where FIM and SIEM systems also enhance security, by analyzing system
activity for signs of suspicious behavior.


5. Rip it up and start again: And if you do fall victim to Ransomware, think how grateful you
will be when you can simply scrap a Desktop, re-image it and recover all data, all in its
useable, non-encrypted state.

Goes without saying that backups are critical, but make sure the restore process works
by testing regularly.



About the Author

Mark Kedgley is Chief Technical Officer at New Net Technologies (NNT)
where he is responsible for driving ongoing product development; his
primary objective being to continually push NNT’s data security and
compliance solutions to protect their customers’ sensitive data against
security threats and network breaches in the most efficient and cost
effective manner, whilst being easier to use than anything else out there
in the market.

Mark has been CTO at NNT since 2009, and has over 20 years’ experience in IT business
development and sales. Mark combines a visionary yet pragmatic approach to IT: combining not
just the ability to analyse business issues and scope technological solutions to address needs,
but to also deliver product that is both fit-for-purpose and future-proof.
























18 Cyber Warnings E-Magazine – July 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   13   14   15   16   17   18   19   20   21   22   23