Guest

Cisco Ransomware Defense

hero-ransomware-600x400

Keep ransomware at bay

Don't let ransomware sidetrack your business by fighting it in all the places where it will try to get in. Our solution protects you from the DNS layer to email to the endpoint. And it's backed by industry-leading Talos threat research.

Learn more

How can organisations defend themselves against cyber crime and ransomware?

The wide world of opportunities opening to businesses and other organisations through digitization is matched only by the potential it’s delivering for cyber crime.

Ransomware is the current headline-grabbing threat to the viability of businesses. The impact is still reverberating from WannaCry which hit more than 150 countries in May crippling critical infrastructure, including transport networks and hospitals. Dubbed by WIRED as "the worst digital disaster to strike the internet in years" it was quickly followed by a modified version of the Petya virus. Originally misnamed ransomware, it simply wiped systems outright, whether the recipient paid or not.

Australia, as one of the world’s biggest targets for cyber attacks, did not go untouched. In 2016, the number of cyber security incidents detected in Australian businesses soared 109%, compared to the global average of 38%.

Annually, at least one in two Australian businesses is hit by one or more cyber attacks, according to CISCO research, while monthly almost one in four Australian businesses has its operations interrupted by cyber attacks.

In 2017, keeping unpredictability top of mind is the only surefire strategy when it comes to planning cyber security. While ransomware has recently had top-billing, malware and phishing also remain major threats.

Cisco Ransomware Defense Package

Cisco provides a full suite of tools to Protect, defend and avoid ransomware attacks

DNS layer protection

DNS layer protection

Cisco Umbrella Roaming protects devices on and off the corporate network. Block DNS requests before a device can even connect to sites hosting ransomware. The full OpenDNS Umbrella package provides even greater DNS layer protection. See how in this customer case study.

Endpoint protection

Endpoint protection

Cisco Advanced Malware Protection (AMP) for Endpoints stops ransomware files from running on endpoints.

Expert advice

Expert advice

Cisco Security Services provides immediate triage during an incident response. It streamlines deployments of Advanced Malware Protection (AMP), Next-Generation Firewall (NGFW), and other solution products.

Email threat protection

Email threat protection

Cisco Email Security with Advanced Malware Protection (AMP) blocks ransomware through spam and phishing emails. It even identifies malicious email attachments and URLs. Address attacks before they spread. 

Sophisticated segmentation

Sophisticated segmentation

With Cisco TrustSec technology you can dynamically segment your network, so access to services and applications stays highly secure.

Advanced defences for advanced attacks

Advanced defences for advanced attacks

Cisco Next-Generation Firewalls with AMP Threat Grid sandboxing technology contain both known and unknown malware. They also block command-and-control callbacks to ransomware hosts.

Growth potential for cyber attacks

Rapid growth in targets for cyber-criminals - from the Internet of Everything (IoE) to the proliferation of mobile devices, the public cloud and cloud infrastructure - deliver a vast range of options for hackers and others intent on gaining access to organisational resources.

Their popularly deployed tactics are definitely not new: exploiting lapses in patching and updating (yes, this was the big preventative lesson from WannaCry); luring users into socially-engineered traps; sending malicious spam (Cisco researchers observe, while spam represents more than 60% of email, about 8 - 10% of global spam monitored in 2016 could be classified as malicious) and "malvertising" (malware-laden advertisements).

One of the major emerging vulnerabilities identified by CISCO is in middleware, which is used to connect platforms or applications. Libraries in middleware may be updated less often because it’s not client-facing. Enterprises are also often slow to react or recognize a threat in middleware.

Connections between middleware and other crucial systems, such as email or messaging, however, may allow an attacker to move into these systems and send phishing messages or spam. Active monitoring of middleware security is essential.

 

AN13153-720x480

Better protection

Learn how a layered architectural approach reduces ransomware risks.

Get at-a-glance

Future cyber security strategy

Research shows today’s organisations investigate little more than half the security alerts they receive making the need for integrated and automated security systems paramount.

Yet data generation in enterprises is exponential indicating a broad defence strategy is needed to tackle the upcoming cyber security challenges.

“When trying to position our architectural benefits to executives, we’ve noticed a trend of resistance from some technical people, many of whom haven’t experienced our products. We know Talos is well regarded by these people, and we wanted to harness that in a competition that encourages them to try us and write about their experiences” says Anthony Stitt, General Manager of Security, Cisco Australia and New Zealand. “Operationalizing security means truly understanding what the enterprise needs to protect, as well as what measures should be used to protect those assets.”

Industry experts point to new types of skills required in data science and analytics for cyber security going beyond automation to “artificial security intelligence”. Adaptive skills will be key for the next phase of cyber security, reports international technology research house, Gartner.

While remaining proactive on vulnerabilities and prevention, the next five years will see more emphasis on detection, response and remediation, tips Sid Deshpande, principal research analyst at Gartner.

To protect your business from ransomware and other cyber threats:

  • Ensure you’re blocking threats with security protection that runs in real-time.
  • Make everyone in your business aware of the increasing risks from spam and email phishing.
  • Keep software consistently patched.
  • Remember malware authors are constantly inventing new methods for evading detection making cloud-hosted security protection the smartest line of defence.

Learn more about beating cyber attacks and future trends in cyber security.

Resources

At-a-glance

Overview