eBooks/eGuides

Ransomware Defense for Dummies eBook

Issue link: https://insights.oneneck.com/i/1093615

Contents of this Issue

Navigation

Page 33 of 52

28 Ransomware Defense For Dummies, Cisco Special Edition These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. HOW A GLOBAL MEDICAL MANUFACTURER ROUTS OUT RANSOMWARE The challenge: Fighting infinite security challenges with finite resources In the decades since its 1983 founding, Octapharma has steadily become one of the world's largest human protein manufacturers. With a corporate initiative designed to double production capacity and increase overall efficiencies by 2019 now underway, however, the company is experiencing unprecedented expansion. The impact of this growth spurt is evident throughout the organization — even at the network level. "As we add more employ- ees in more locations using more mobile devices and cloud services, we also add new network security vulnerabilities," says Octapharma Global Senior Network Engineer Jason Hancock. "We've seen a spike in a variety of malicious activities, including ransomware." "Rather than trying to cover any exposures by hiring the kind of trained security practitioners already in short supply, identifying new solutions to address those vulnerabilities and aligning with organiza- tion efficiency objectives has been a priority," he adds. "In keeping with that focus," says Hancock, "first we needed to keep the network from going down every 15 minutes and improve efficien- cies both for our team and users. When I joined the company in 2014, my initial objective was to get things stabilized so I could focus on pre- venting incrementally more aggressive malware, such as a CryptoLocker breach that we encountered." The solution: Functionality that fits "Before I came to Octapharma, the team had been working for some time to migrate from on-premises web security appliances to the same vendor's cloud service, selected by a predecessor. I was initially tasked with completing that deployment," recalls Hancock. "As soon as I saw what I was being asked to work with, I knew it wasn't going to meet our needs."

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Ransomware Defense for Dummies eBook