Businesses Lack a Workable Ransomware Recovery Strategy

More than a third of businesses do not have a ransomware emergency plan in place, or are not aware avg.com/activation if one exists Install Avg With License Number activation within their company. avg.com/retail According to research from On track of 484 organizations, 39% either did not have avg internet security or were not unaware www.avg.com/activation  of a ransomware strategy www.avg.com/activate, while 26% admitted they couldn’t access any working backups after an attack.

“The threat of ransomware has never been Install Avg With License Number activation greater” said Philip Bridge, president of Ontrack. “The fact that only 39% of respondents  avg.com/activation to our survey   avg internet security have an emergency plan www.avg.com/activate in place for a www.avg.com/activation  ransomware attack is shocking avg.com/retail . They are gambling with their and their customers’ data.

“It is imperative, now as ever avg.com/activation, to ensure your organization www.avg.com/activation  has processes and procedures www.avg.com/activate in place to mitigate the impact of any cyber-attack avg internet security avg.com/retail  and protect sensitive data Install Avg With License Number activation,” added Bridge.

As the third anniversary of the NotPetya attacks were marked at the weekend, David Grout, CTO of EMEA at , said NotPetya highlighted the need for resiliency avg internet security, backup and preparation avg.com/activation, as well as the importance of being avg.com/retail  able to track Install Avg With License Number activation and identify the perpetrators www.avg.com/activate and understand their motives.

“In terms of what can be done www.avg.com/activate to mitigate the effects of these attacks, primarily, it is essential that patches are made available quickly and avg.com/activation that they are widely avg.com/retail  adopted avg internet security www.avg.com/activation . If a discovered vulnerability can be exploited Install Avg With License Number activation, it is highly likely that threat groups will use it, and continue to do so until it is fixed, inflicting untold damage,” he said.

“The NotPetya attack could have been mitigated by ensuring updates Install Avg With License Number activation to software were regularly conducted avg.com/activation, as well as thorough avg internet security assessments of a given organization’s security www.avg.com/activate, especially through simulated cyber-breaches avg.com/retail .”

Speaking to Infosecurity, CEO Brian Honan said, with avg.com/activation ransomware becoming an increasing www.avg.com/activation  concern for Install Avg With License Number activation many organizations www.avg.com/activate, he is seeing more businesses avg.com/retail  take steps to tackle the threat avg internet security.

“However, many of these steps focus www.avg.com/activation  very much on the preventive aspect of security controls and in particular on ensuring effective avg.com/activation anti-virus software avg.com/retail  is in place. While this is an important element in protecting www.avg.com/activate against ransomware, organizations avg internet security do need to take a more holistic approach to protecting their businesses Install Avg With License Number activation and ensuring they can continue to function and recover from an attack should it happen.”

Honan recommended having robust data backup and data recovery strategies in place. “The key is to ensure business resilience avg.com/activation in the event  avg.com/retail  of a ransomware attack Install Avg With License Number activation,” he said. “To achieve this, organizations should incorporate their incident  avg internet security response www.avg.com/activate processes, for all cyber-attacks and not just for ransomware attacks www.avg.com/activation , with their business continuity plan so they can continue to operate, while looking to recover from secure backups.

Comments

Popular posts from this blog

Reasons You Should Upgrade to Windows 10

Cybersecurity vs. Information Security vs. Network Security

Everything you need to know about firewalls