ransomware: how vulnerable is your data?vectorusa will help avoid becoming a victim of ransomware...

7
RANSOMWARE: HOW VULNERABLE IS YOUR DATA? By performing our assessment and implementing a best- practice backup and recovery program, VectorUSA will help your organization avoid becoming a victim of ransomware demands.

Upload: others

Post on 28-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RANSOMWARE: HOW VULNERABLE IS YOUR DATA?VectorUSA will help avoid becoming a victim of ransomware demands. BENEFITS REALIZED FROM OUR DETECT, PROTECT AND RECOVER SERVICES INCLUDE:

RANSOMWARE:HOW VULNERABLE IS YOUR DATA?

By performing our assessment and implementing a best-practice backup and recovery program, VectorUSA will help your organization avoidbecoming a victim of ransomware demands.

Page 2: RANSOMWARE: HOW VULNERABLE IS YOUR DATA?VectorUSA will help avoid becoming a victim of ransomware demands. BENEFITS REALIZED FROM OUR DETECT, PROTECT AND RECOVER SERVICES INCLUDE:

2

CYBERSECURITY SOLUTIONS: DETECT, PROTECT AND RECOVER SERVICES

Running a secure IT environment can seem like a daunting and never-ending struggle. Choosing between and maintaining different security products, firewalls, anti-virus, software agents, device managers, intrusion devices and the list goes on.

Businesses must choose these expensive methods and systems to prevent ransomware attacks from disrupting production and revenue. But when a new non-preventable threat comes knocking through defensive doors, can your business be sure to recover their data and survive the attack?

Page 3: RANSOMWARE: HOW VULNERABLE IS YOUR DATA?VectorUSA will help avoid becoming a victim of ransomware demands. BENEFITS REALIZED FROM OUR DETECT, PROTECT AND RECOVER SERVICES INCLUDE:

3

CYBERSECURITY SOLUTIONS: DETECT, PROTECT AND RECOVER SERVICES

ABOUT RANSOMWAREWhether it’s a user clicking on an infected link, downloading compromised software or a targeted threat, the likelihood of ransomware affecting your business is not diminishing due to its continued effectiveness at generating payouts to malicious perpetrators. If your company receives a ransomware attack, there is no guarantee that data will be recoverable, malware will be removed and loss of company revenue will be avoided.

BY EN GAGIN G WI TH VEC TOR U SA ,your company will be guided through the ransomware recovery process to assess the viability and recoverability of the most important asset of your IT organization - the company’s critical data. By performing the assessment and implementing a best practice backup and recovery program, VectorUSA will help avoid becoming a victim of ransomware demands.

B EN EF I TS RE AL IZED FROM OU R D E TEC T, PROTEC T AN D RECOVER S ERVICES IN CLU D E:

Recovering critical data after malicious compromise (hacking/rootkit/trojan) or non-malicious software update or upgrade causes disruption.

Aligning with regulatory or other compliance for backup and disaster recovery.

Achieving auditable verification of critical data integrity and protection.

No cybersecurity

product can

protect 100%

against the

threat of a

ransomware

attack on today’s

businesses.

Page 4: RANSOMWARE: HOW VULNERABLE IS YOUR DATA?VectorUSA will help avoid becoming a victim of ransomware demands. BENEFITS REALIZED FROM OUR DETECT, PROTECT AND RECOVER SERVICES INCLUDE:

4

CYBERSECURITY SOLUTIONS: DETECT, PROTECT AND RECOVER SERVICES

OU R EXPERT IS E

Education. The educational space provides a large attack surface with the sheer quantity of user endpoints and entry points. Often, school districts have budget for firewall systems and entry-level backup systems, but no proof in testing or simulations. Critical data may include Student Information Systems, File Servers, HR Systems and Surveillance Systems.

Small/Medium Business. Small to medium businesses may have a medium level of security point solutions, though often not integrated or enterprise-grade. Critical data may vary significantly from sector to sector. Configurations may not be best-practice due to small staff and limited expertise. Formal recovery plans may not exist, or if they do, testing and simulations are not consistently performed.

Government. Governmental entities often control highly critical and sensitive data. Configurations may not be best-practice due to small staff and limited expertise. Formal BCP/DR plans often exist, but testing and simulations are not consistently performed.

Page 5: RANSOMWARE: HOW VULNERABLE IS YOUR DATA?VectorUSA will help avoid becoming a victim of ransomware demands. BENEFITS REALIZED FROM OUR DETECT, PROTECT AND RECOVER SERVICES INCLUDE:

5

CYBERSECURITY SOLUTIONS: DETECT, PROTECT AND RECOVER SERVICES

D E TEC T, PROTEC T AN D RECOVER (D PR) S ERVICE EN GAG EM ENT

Detect. The service begins with VectorUSA consultants engaging with business leadership to appreciate the business’s unique goals and drives and how the business interacts with its Information Technology resources to achieve these goals. This interaction leads to a discovery of the critical data used by the business and the systems on which the data resides. For example, mission-critical data may be present on creative developer workstations, executive laptops, file shares or across multiple data center or Cloud spaces.

By understanding the criticality of the data and its primary storage locations, VectorUSA can identify the vulnerability presented to the systems by a ransomware attack.

Protect. VectorUSA will then review the business’s current backup and recovery mechanisms (services, software, hardware, appliances, configurations) to understand how the business currently responds to primary data loss or compromise.

Our DPR Service may also include a high-level review of the current security appliances and protection mechanisms (endpoint, AV, IPS/IDS, etc.). Because businesses are at different security posture matureness, the depth and maturity of the planning and procedures may vary from business to business. If no formal planning exists, VectorUSA can help businesses with the creation, guidance or planning of this document as an additional engagement through its consulting services.

Page 6: RANSOMWARE: HOW VULNERABLE IS YOUR DATA?VectorUSA will help avoid becoming a victim of ransomware demands. BENEFITS REALIZED FROM OUR DETECT, PROTECT AND RECOVER SERVICES INCLUDE:

6

CYBERSECURITY SOLUTIONS: DETECT, PROTECT AND RECOVER SERVICES

Recover. Over the next phase, VectorUSA will begin to align the current backup and response planning with a ransomware event targeting critical data. This analysis will use up-to-date methods of ransomware propagation to include simulated contagion of multiple systems within the company environment. Depending on the current backup and recovery strategy, VectorUSA may perform active simulations or demonstrations of secondary data recovery for feasibility testing.

Finally, VectorUSA will present the results of the analysis and recovery feasibility testing to the business with recommendations and strategic plans to improve the security of the critical data. These suggested plans will include any necessary remediation of current systems as well as future services and systems that will benefit the business and lower its ransomware risk.

ON GOIN G S ERVICESAs an option to our initial Detect, Protect and Recover Services, VectorUSA can also provide ongoing managed DPR Services for your business. At a set interval (monthly, quarterly, bi-annually), we can perform the DPR Service again as data or systems change, new threats emerge, or as a compliance benefit.

Each business is different in terms of its mature security footing, current backup processes and formal documentation and plans. Our ongoing services can help your business with:

Monitor backup jobs to appliances or Cloud (alert or remediate if failed backup).

Representative testing of backup recovery

Recommendations from professional Security consultants

Formal Business Continuity Plan/ Business Impact Analysis

Disaster Recovery Plan

Page 7: RANSOMWARE: HOW VULNERABLE IS YOUR DATA?VectorUSA will help avoid becoming a victim of ransomware demands. BENEFITS REALIZED FROM OUR DETECT, PROTECT AND RECOVER SERVICES INCLUDE:

CONTAC T U S TODAYWith the right network and behavior analytics, you’ll be thatmuch more prepared to remediate any threats that pose adanger to your business data. Find anomalies residing within your environment with our comprehensive cybersecurity risk assessment.

Headquarters3530 Voyager StreetTorrance, CA 90503T 310.436.1000F 310.436.1060

San Diego9808 Waples StreetSan Diego, CA 92121T 858.546.1014F 858.546.1086

Inland Empire8647 Ninth StreetRancho Cucamonga, CA 91730T 909.931.1022F 844.269.9739

Phoenix4930 East Beverly RoadPhoenix, AZ 85044T 480.967.0953F 844.270.2257

Charlotte2520 Whitehall Park DrSuite 300Charlotte, NC 28273T 310.436.1040

vectorusa.comGeneral Information 800.929.4516Customer Service Hotline 877.569.8800Customer Service [email protected]