{"id":35,"date":"2020-03-02T11:30:00","date_gmt":"2020-03-02T11:30:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=35"},"modified":"2020-10-12T13:59:23","modified_gmt":"2020-10-12T17:59:23","slug":"best-defensive-tactics-ransomware","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/","title":{"rendered":"Best Defensive Tactics for Ransomware"},"content":{"rendered":"<p>In October 2019, the FBI issued a \u2018high impact\u2019 cyber attack warning after several state and local governments in the US were attacked by ransomware. Schools and healthcare facilities were also warned as they are considered soft targets for criminal enterprises. Ransomware attacks are not as frequent as they used to be, but they are becoming more sophisticated, so the impact and losses are greater.<\/p>\n<p>There are three major attack techniques: email phishing schemes, remote desktop protocol vulnerabilities and software vulnerabilities. Phishing is the most common vector of a successful attack, especially for small businesses and personal systems. This is because ransomware is essentially malware, or a virus, that can spread in attachments or be downloaded from clicked links. Because phishing schemes have become more sophisticated, attackers have an easier time fooling people, which is why it plays a huge role in the spread and propagation of all malware, including ransomware.<\/p>\n<p>Ransomware is a serious threat. Preventing it follows the same rules as preventing malware, which essentially means that your systems must have regular offsite and gapped backups. You must ensure that your backups cannot be reached by your primary system when backups aren\u2019t actively occurring. If that precaution is taken, then ransomware can be mitigated by simply reformatting the drives or removing them and refreshing the data with backups.<\/p>\n<p>Containing ransomware depends on how it is structured. Most people have the instinct to shut down the system, cut it off from everything else, but that is a mistake. Shutting down the system takes away any chance of recovery, which requires access to volatile memory to try and locate encryption keys. A better solution is to remove the system from the network, unmount any affected drives if possible, and if you can start monitoring or recording what is in RAM, then do so immediately.<\/p>\n<p>If you find yourself or your business under attack, there is always risk mitigation to consider. The FBI will always recommend NOT paying ransom because it empowers criminal entities to continue what they are doing. However, if the damage would be millions of dollars while the ransom is $500, and attempting to recover the data is thousands of dollars, it is worth it to try paying the ransom. In this event, the incident should still be reported. Make sure forensics and law enforcement are aware. Inform your insurance company as ransom is tax deductible. Inform the security community so that security practitioners and law enforcement can try to prevent future attacks.<\/p>\n<p>The biggest keys here are to ensure you have regular gapped backups of your data in a location not connected to your primary systems, and to NOT power down during an attack. Regular gapped backups will save your business from being crippled by an attack, and may in fact prevent you from having to spend any money on recovery. Plus, simply separating the exposed machine or shutting down affected drives will allow you a chance to find the culprit responsible for the attack and prevent further attacks on other businesses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing schemes are the most successful vector of ransomware. Creating defensive tactics around ransomware is an integral part of the cybersecurity process.<\/p>\n","protected":false},"author":1,"featured_media":36,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,4,26,14],"tags":[25,24,44,22,21,23,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Best Defensive Tactics for Ransomware - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Phishing schemes are the most successful vector of ransomware. Creating defensive tactics around ransomware is an integral part of the cybersecurity process\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Defensive Tactics for Ransomware\" \/>\n<meta property=\"og:description\" content=\"Phishing schemes are the most successful vector of ransomware. Creating defensive tactics around ransomware is an integral part of the cybersecurity process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-02T11:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-12T17:59:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/black-flat-screen-computer-monitor-1714208-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Best Defensive Tactics for Ransomware\",\"datePublished\":\"2020-03-02T11:30:00+00:00\",\"dateModified\":\"2020-10-12T17:59:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/\"},\"wordCount\":509,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/black-flat-screen-computer-monitor-1714208-scaled.jpg\",\"keywords\":[\"cyber attack\",\"cyber security\",\"gapped backups\",\"phishing\",\"Ransomware\",\"remote desktop protocol\",\"Security\"],\"articleSection\":[\"Cyber Security\",\"Information Security\",\"Ransomware\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/\",\"name\":\"Best Defensive Tactics for Ransomware - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/black-flat-screen-computer-monitor-1714208-scaled.jpg\",\"datePublished\":\"2020-03-02T11:30:00+00:00\",\"dateModified\":\"2020-10-12T17:59:23+00:00\",\"description\":\"Phishing schemes are the most successful vector of ransomware. Creating defensive tactics around ransomware is an integral part of the cybersecurity process\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/black-flat-screen-computer-monitor-1714208-scaled.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/black-flat-screen-computer-monitor-1714208-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Photo by Josh Sorenson from Pexels\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Best Defensive Tactics for Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Best Defensive Tactics for Ransomware - PWV Consultants","description":"Phishing schemes are the most successful vector of ransomware. Creating defensive tactics around ransomware is an integral part of the cybersecurity process","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Best Defensive Tactics for Ransomware","og_description":"Phishing schemes are the most successful vector of ransomware. Creating defensive tactics around ransomware is an integral part of the cybersecurity process.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-03-02T11:30:00+00:00","article_modified_time":"2020-10-12T17:59:23+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/black-flat-screen-computer-monitor-1714208-scaled.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Best Defensive Tactics for Ransomware","datePublished":"2020-03-02T11:30:00+00:00","dateModified":"2020-10-12T17:59:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/"},"wordCount":509,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/black-flat-screen-computer-monitor-1714208-scaled.jpg","keywords":["cyber attack","cyber security","gapped backups","phishing","Ransomware","remote desktop protocol","Security"],"articleSection":["Cyber Security","Information Security","Ransomware","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/","url":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/","name":"Best Defensive Tactics for Ransomware - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/black-flat-screen-computer-monitor-1714208-scaled.jpg","datePublished":"2020-03-02T11:30:00+00:00","dateModified":"2020-10-12T17:59:23+00:00","description":"Phishing schemes are the most successful vector of ransomware. Creating defensive tactics around ransomware is an integral part of the cybersecurity process","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/black-flat-screen-computer-monitor-1714208-scaled.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/black-flat-screen-computer-monitor-1714208-scaled.jpg","width":2560,"height":1707,"caption":"Photo by Josh Sorenson from Pexels"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/best-defensive-tactics-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Best Defensive Tactics for Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/35"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":5,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/35\/revisions"}],"predecessor-version":[{"id":936,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/35\/revisions\/936"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/36"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=35"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=35"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}