eBooks/eGuides

Ransomware Defense for Dummies eBook

Issue link: https://insights.oneneck.com/i/1093615

Contents of this Issue

Navigation

Page 19 of 52

14 Ransomware Defense For Dummies, Cisco Special Edition These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. During an Attack: Detect, Block, and Defend If your organization is under attack, fast and effective incident response is required to limit any potential damage. The specific action steps and remediation efforts to be undertaken will be different for each unique situation. However, the time to learn the breadth and extent of your organization's incident response capabilities is not during an attack! Your incident response efforts should be well understood and coordinated — which is accom- plished before an attack — and well documented and repeatable, so that you can reconstruct an incident after an attack and iden- tify lessons learned and potential areas for improvement. A key component of effective incident response that is often over- looked is information sharing, which includes the following: » Communicating timely and accurate information to all stakeholders: Pertinent information needs to be provided to executives in order to ensure adequate resources are committed to response and remediation, critical and informed business decisions can be made, and appropriate information is, in turn, communicated to employees, law enforcement, customers, shareholders, and the general public. » Automatically sharing new security intelligence through- out the architecture: Bringing together critical data from disparate systems, such as security information and event management (SIEM), threat intelligence, and sandboxing tools, enables the incident response team to quickly surface and effectively triage high-impact security incidents. For example, if a new malware payload is detected on an endpoint, it should automatically be sent to a cloud-based threat intelligence platform for analysis in order to find and extract any indicators of compromise (IoCs). Then new countermeasures should automatically be deployed and enforced.

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Ransomware Defense for Dummies eBook