{"id":43342,"date":"2020-09-22T01:29:00","date_gmt":"2020-09-22T05:29:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=43342"},"modified":"2020-09-22T01:29:00","modified_gmt":"2020-09-22T05:29:00","slug":"ransomware-this-essential-step-could-help-you-make-it-through-an-attack","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/09\/22\/ransomware-this-essential-step-could-help-you-make-it-through-an-attack\/","title":{"rendered":"Ransomware: This essential step could help you make it through an attack"},"content":{"rendered":"\n<p>Plan for your organisation to become the victim of a <strong>ransomware<\/strong> or malware attack, even if you think it&#8217;s extremely unlikely you&#8217;ll be targeted because having an incident response plan will greatly reduce the impact if the worst happens. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2016\/08\/13\/16\/49\/computer-1591018__340.jpg\" alt=\"\" width=\"751\" height=\"499\"\/><\/figure><\/div>\n\n\n\n<p>The advice is part of the National Cyber Security Centre&#8217;s (<a href=\"https:\/\/www.zdnet.com\/article\/the-uks-cybersecurity-agency-is-getting-a-new-boss\/\">NCSC<\/a>) updated guidance on mitigating malware and <strong>ransomware<\/strong> attacks under a new section on preparing for an incident. The guidance has been updated because of what the NCSC describes as &#8220;a growing threat from\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\"><strong>ransomware <\/strong>attacks<\/a>&#8220;.<\/p>\n\n\n\n<p>One of the key pieces of advice is to plan for an attack on your systems even if you think it&#8217;s unlikely, because as the agency notes, there are many organisations that have been impacted by malware as collateral damage, even when they weren&#8217;t the intended target.  <\/p>\n\n\n\n<p>For example, both the&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/wannacry-ransomware-crisis-one-year-on-are-we-ready-for-the-next-global-cyber-attack\/\">WannaCry and NotPetya cyberattacks<\/a>&nbsp;caused damage to organisations around the world that weren&#8217;t specifically being targeted by hackers.<\/p>\n\n\n\n<p>To ensure that an organisation is as prepared for an attack as possible, the first thing managers should do is\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/the-key-to-stopping-cyberattacks-understanding-your-own-systems-before-the-hackers-strike\/\" target=\"_blank\">identity their critical assets<\/a>\u00a0and what the impact would be if they were disrupted by a malware attack \u2013 then develop an incident response plan that accounts for what should happen if there is an attack.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.zdnet.com\/article\/ransomware-this-essential-step-could-help-you-make-it-through-an-attack\/&amp;ct=ga&amp;cd=CAEYBioUMTc0ODMzMDY3NTY5OTc3MjQ0MjUyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNHy5OnUv3AHRHG-88IG5B0-uheIgw\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plan for your organisation to become the victim of a ransomware or malware attack, even if you think it&#8217;s extremely unlikely you&#8217;ll be targeted because having an incident response plan will greatly reduce the impact if the worst happens. The <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/09\/22\/ransomware-this-essential-step-could-help-you-make-it-through-an-attack\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-43342","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/43342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=43342"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/43342\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=43342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=43342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=43342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}