“What bothers me most is how preventable this all is.”
Below are a few highlights from Kurtis’ op-ed.
I never intended to become a ransomware negotiator. But a year and a half ago, we notified a ransomware victim that their corporate data was about to be released on a dark web “shame site” for all to see, and they pulled me in as the lead troubleshooter. Following that, more cases followed and today it’s turned into a deluge. Now I tend to show up a lot in the media as “the guy who talks to ransomware bad guys.” It’s not a job I want or particularly enjoy.
We’ve learned a lot since that first case. And I’ll put it bluntly — the bad guys are not using very sophisticated techniques in their attacks. In fact, they’re using the same old tricks they’ve used for a long time. Only instead of just stealing data (remember those “good old days?”), they’re breaking into corporate networks and unleashing ransomware.
The ransomware epidemic will stop when people stop resisting the ransomware vaccine — simple cyber hygiene. For example, studies show that more than 80% of last year’s ransomware attacks focused on something called “remote desktop protocol (RDP).” Companies are not implementing simple security controls on RDP, and the threat actors are exploiting it. Fixing that alone would substantially reduce the number of “soft targets” for ransomware attacks (and ransomware actors like soft targets — they’re easy money. So every company should strive to not be “low-hanging fruit.” Not a big ask!).
Three steps; 99.2% protection. It’s that simple.
GroupSense does some of the largest negotiations for ransomware. Ransomware is a quick and easy path to revenue for criminals. Unfortunately, ransomware isn’t always the first play in a criminal’s playbook. They usually have been in your network for a while and deploy ransomware after they’ve accessed all your data. GroupSense’s team of experienced negotiators developed cybersecurity tips to help reduce your risk.