Presented by James Reece Portland Community College Confidential 1 The Journey towards mitigating Ransomware Portland Community College Confidential 2 What is ransomware History of ransomware ID: 580009
Download Presentation The PPT/PDF document "Mitigating Ransomware" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Mitigating Ransomware
Presented by James Reece
Portland Community College Confidential
1Slide2
The Journey towards mitigating Ransomware
Portland Community College Confidential
2
What is
ransomware
History of ransomware
Recent organizations effected by Ransomware
Dangers of paying ransomware
Organizational approach to ransomware mitigationSlide3
A type of software designed to block access to a computer system until a sum of money is paid.
What is Ransomware?
Portland Community College Confidential
3Slide4
History of Ransomware
Portland Community College Confidential
4Slide5
University of Calgary
- $15,780
Kansas Heart Hospital - $17,000
California Hollywood Presbyterian Medical Center
- $17,000
Collinsville, Alabama, Police Department
–
Loss of Data
Recent Organizations effected by Ransomware
Portland Community College Confidential
5Slide6
- No Guarantee they will give you the key to unlock your
data.
Dangers of Paying Ransomware?
Portland Community College Confidential
6
- Once you have paid, you are considered a soft target for repeatable attacks.
- Fuels Cyber criminals to develop more sophisticated ransomware.Slide7
Three main stages of Ransomware mitigation
Portland Community College Confidential
7
Prevent
Contain
RespondSlide8
Organizational approach to mitigating ransomware
Portland Community College Confidential
8
Prevent
Communication/interaction Strategy:
End user Training
Videos/Articles
Workshops
IT/Community interaction
On going collaboration between IT and community
Review of infection strategy and policySlide9
Organizational approach to mitigating ransomware
Portland Community College Confidential
9
Prevent
Technical strategy
Email Security
Intrusion Prevention
Browser Protection
Regular updates/patches for OS or software
Offsite & Secondary Backup solutionSlide10
Organizational approach to mitigating ransomware
Portland Community College Confidential
10
Contain
Communication/interaction Strategy
:
Communicate that a virus is on the network.
Communicate with the effected end host user to contain the system.Slide11
Organizational approach to mitigating ransomware
Portland Community College Confidential
11
Contain
Technical strategy
Network Anti-Virus/Anti-Bot
End point Anti-Virus/Malware
Periodic Penetration testing
Periodic End point scans
Threat EmulatorSlide12
Organizational approach to mitigating ransomware
Portland Community College Confidential
12
Respond
Communication/interaction Strategy
:
Communicate with end user(s) about the status of system.
Work with End user(s) to launch an investigation into the cause of the infection.
Community with Community to avoid infecting other systems with the same Virus.Slide13
Organizational approach to mitigating ransomware
Portland Community College Confidential
13
Respond
Technical strategy
Disconnect the system from the network.
Scan system for Ransomware
Remediate
Full restore from previous back up solution