eBooks/eGuides

Ransomware Defense for Dummies eBook

Issue link: https://insights.oneneck.com/i/1093615

Contents of this Issue

Navigation

Page 35 of 52

30 Ransomware Defense For Dummies, Cisco Special Edition These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. (continued) "We've even identified a few phishing emails and tested them by trying to click on their links; thanks to Umbrella, the sites were not accessible." Another unexpected benefit? Says the network engineer, "By correlat- ing the great data that comes out of the Umbrella dashboard with our internal systems, we've found infected machines that were previously undetected." With its security stack now able to block threats at the DNS layer, the firm continues to look for ways to keep reinforcing the network with proactive security management. "While Umbrella is very capable of blocking sites based on category policies, it's most effective as a secu- rity tool and with that as a focus in our deployment, it's a critical com- ponent of our defense-in-depth strategy. I'm currently investigating additional tools that are part of Cisco's security portfolio to continue bolstering that strategy," the network engineer notes. "I am consider- ing firewall enhancements, malware protection for endpoints, and greater coordination among the products in our security toolset." For Jason Hancock, seeing has always been believing. "I've been using Umbrella at home for years," he says. "And now that I've seen it suc- ceed in two different organizations as well, my colleagues tell me that they too just can't say enough about Cisco's unique and highly effec- tive approach to security." Securing Endpoints and Addressing Email Threats Today's malware threats are more sophisticated than ever. Advanced malware, including ransomware, evolves quickly and can evade detection after it has compromised a system using various methods, including the following: » Sleep techniques » Polymorphism and metamorphism » Encryption and obfuscation » Use of unknown protocols

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Ransomware Defense for Dummies eBook