Don't let ransomware sidetrack your business by fighting it in all the places where it will try to get in. Our solution protects you from the DNS layer to email to the endpoint. And it's backed by industry-leading Talos threat research.
The wide world of opportunities opening to businesses and other organisations through digitization is matched only by the potential it’s delivering for cyber crime.
Ransomware is the current headline-grabbing threat to the viability of businesses. The impact is still reverberating from WannaCry which hit more than 150 countries in May crippling critical infrastructure, including transport networks and hospitals. Dubbed by WIRED as "the worst digital disaster to strike the internet in years" it was quickly followed by a modified version of the Petya virus. Originally misnamed ransomware, it simply wiped systems outright, whether the recipient paid or not.
Australia, as one of the world’s biggest targets for cyber attacks, did not go untouched. In 2016, the number of cyber security incidents detected in Australian businesses soared 109%, compared to the global average of 38%.
Annually, at least one in two Australian businesses is hit by one or more cyber attacks, according to CISCO research, while monthly almost one in four Australian businesses has its operations interrupted by cyber attacks.
In 2017, keeping unpredictability top of mind is the only surefire strategy when it comes to planning cyber security. While ransomware has recently had top-billing, malware and phishing also remain major threats.
Cisco provides a full suite of tools to Protect, defend and avoid ransomware attacks
Cisco Advanced Malware Protection (AMP) for Endpoints stops ransomware files from running on endpoints.
Cisco Security Services provides immediate triage during an incident response. It streamlines deployments of Advanced Malware Protection (AMP), Next-Generation Firewall (NGFW), and other solution products.
Cisco Email Security with Advanced Malware Protection (AMP) blocks ransomware through spam and phishing emails. It even identifies malicious email attachments and URLs. Address attacks before they spread.
With Cisco TrustSec technology you can dynamically segment your network, so access to services and applications stays highly secure.
Rapid growth in targets for cyber-criminals - from the Internet of Everything (IoE) to the proliferation of mobile devices, the public cloud and cloud infrastructure - deliver a vast range of options for hackers and others intent on gaining access to organisational resources.
Their popularly deployed tactics are definitely not new: exploiting lapses in patching and updating (yes, this was the big preventative lesson from WannaCry); luring users into socially-engineered traps; sending malicious spam (Cisco researchers observe, while spam represents more than 60% of email, about 8 - 10% of global spam monitored in 2016 could be classified as malicious) and "malvertising" (malware-laden advertisements).
One of the major emerging vulnerabilities identified by CISCO is in middleware, which is used to connect platforms or applications. Libraries in middleware may be updated less often because it’s not client-facing. Enterprises are also often slow to react or recognize a threat in middleware.
Connections between middleware and other crucial systems, such as email or messaging, however, may allow an attacker to move into these systems and send phishing messages or spam. Active monitoring of middleware security is essential.
Research shows today’s organisations investigate little more than half the security alerts they receive making the need for integrated and automated security systems paramount.
Yet data generation in enterprises is exponential indicating a broad defence strategy is needed to tackle the upcoming cyber security challenges.
“When trying to position our architectural benefits to executives, we’ve noticed a trend of resistance from some technical people, many of whom haven’t experienced our products. We know Talos is well regarded by these people, and we wanted to harness that in a competition that encourages them to try us and write about their experiences” says Anthony Stitt, General Manager of Security, Cisco Australia and New Zealand. “Operationalizing security means truly understanding what the enterprise needs to protect, as well as what measures should be used to protect those assets.”
Industry experts point to new types of skills required in data science and analytics for cyber security going beyond automation to “artificial security intelligence”. Adaptive skills will be key for the next phase of cyber security, reports international technology research house, Gartner.
While remaining proactive on vulnerabilities and prevention, the next five years will see more emphasis on detection, response and remediation, tips Sid Deshpande, principal research analyst at Gartner.
To protect your business from ransomware and other cyber threats: