SecurityInfoWatch.com on Ransomware, a Cybersecurity Attack that Uses Malware to Exploit System Vulnerabilities
Hikvision Outlines ‘Defense in Depth’ as Key Step to Reduce Security Concerns
A recent article by SecurityInfoWatch.com provides an overview of ransomware, a cybersecurity attack that uses malware to exploit system vulnerabilities.
Ransomware is a type of malware (malicious software) that locks up a victim’s data so it can only be decrypted with an encryption key, which is provided to the victim once they make a ransom payment, often paid in cryptocurrency such as bitcoin, according to the article. Verizon’s 2018 Data Breach Investigations Report uncovered that ransomware accounts for 85 percent of all malware found in healthcare systems and accounts for more than 50 percent of discovered malware.
WannaCry is a recent high-profile ransomware attack that exploited a vulnerability in the Microsoft Windows operating system. From the article: “WannaCry is estimated to have infected more than 300,000 systems across 150 countries in a matter of days.” The author, Ray Coulombe, also details others cases such as SamSam ransomware that hit the City of Atlanta in March 2018, and GandCrab, which is typically delivered through phishing emails.
Recommended procedures to reduce security concerns from malware include the use of strong passwords, multi-factor authentication, and disabling unused ports. The article also outlines “defense in depth,” a risk management approach that uses diverse defensive strategies.
Hikvision’s director of cybersecurity, Chuck Davis, advocated for “defense in depth” in a recent blog post. “It’s based on the idea that multiple layers of defense will provide additional protection against a potential cyberattack. This includes network segmentation, which simply stated means splitting a network into separate networks that are isolated, not connected, and compromising one won’t compromise the others. … This is effective for the obvious reason of keeping sensitive resources only accessible by those who need access, but it is also an effective means of compartmentalizing a network environment in case of cyberattack or malware infection,” said Davis.