Ransomware: Plug the gaps in your defence strategy

By Richard Dornhart, National Security Practice Mananger, Data#3

[Reading time: 1 min]

Dealing with ransomware is becoming increasingly common for companies and individuals. In an alarming trend, Australia is on the hotlist for cybercriminals. In fact, the recent Symantec Internet Security Threat report recognises that there was a 141% increase in ransomware attacks in Australia in 2015!

Sadly, the cost of dealing with ransomware is becoming greater. According to geek.com, just one ransomware application generated over US$30 million in a short time for criminals. As experts make clear, cybercrime is highly profitable, which means it’s likely to continue and grow.

If you consider that human beings are the most vulnerable link in your security chain, IT Security professionals need to look at technology solutions that can plug potential gaps in your defence strategy. At a basic level, you must

  • ensure you have a proper backup regime with offline storage,
  • investigate solutions that inspect and block devices that do not meet your standard, and
  • ensure you have an all-encompassing contenting filtering solution for web and email.

For further reading, check out this article on securitybrief.com.au. It’s a good read for every user as it details ten basic rules that you can adopt to keep your networks, application and files safe from ransomware.

If you would like to discuss your organisations approach to security, please reach out to me on LinkedIn.

Tags: Cybersecurity, Ransomware, Security



Managed Services eBook
Your guide to Data#3 Managed Services

Digital disruption is causing significant changes in the workplace, leading to higher expectations for access, security, and support regardless of…

JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…

Data#3 named (HPE) Platinum Partner of the Year and Aruba GreenLake Partner of the Year
Data#3 enjoys double scoops at HPE/Aruba awards night

December 08, 2022; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Azure BaaS
Protecting Data in a Cloud World: Will Backup as a Service be what Keeps Your Business Online Through a Crisis?

Very few organisations could run in a technology-free environment, so naturally, strong IT departments put considerable effort into business continuity…

Azure Site Recovery
Beyond Backup: The Role of Azure Site Recovery in Business Continuity

In the first of our Azure Backup blog series, we discussed the value of data, and the critical importance…