Trustwave SpiderLabs Uncovers Critical Cybersecurity Vulnerabilities Exposing Manufacturers to Costly Attacks. Learn More

Trustwave SpiderLabs Uncovers Critical Cybersecurity Vulnerabilities Exposing Manufacturers to Costly Attacks. Learn More

Services
Capture
Managed Detection & Response

Eradicate cyberthreats with world-class intel and expertise

twi-cloud-lock-color-svg
Managed Security Services

Expand your team’s capabilities and strengthen your security posture

twi-briefcase-color-svg
Consulting & Professional Services

Tap into our global team of tenured cybersecurity specialists

twi-dashboard-color-svg
Penetration Testing

Subscription- or project-based testing, delivered by global experts

twi-database-color-svg
Database Security

Get ahead of database risk, protect data and exceed compliance requirements

twi-email-color-svg
Email Security & Management

Catch email threats others miss with layered security & maximum control

twi-managed-portal-color
Co-Managed SOC (SIEM)

Eliminate alert fatigue, focus your SecOps team, stop threats fast, and reduce cyber risk

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
The Trustwave Approach
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Platform
SpiderLabs Fusion Center
Security Operations Centers
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
Trustwave Blog

Simple Things You Should Be Doing to Protect Against Ransomware

If there is one threat that embodies modern cybercrime, it's ransomware. Ransomware actually dates back nearly three decades, yet for a threat with such a simple concept - encrypting sensitive files and systems, and then demanding payment - it has only soared into the public consciousness over the last few years. Why?

This growing prevalence of ransomware incidents, affecting both consumers and businesses, has occurred in parallel with the continued evolution of the criminal underground, which is built to outfit even technically challenged extortionists with the means to pull off such a heist and amass tidy profits - and thanks to Bitcoin, to do it quickly and anonymously.

In addition, ransomware contains far fewer stages of risk than a criminal may encounter in other types of digital attacks, such as intrusions designed to steal credit card numbers. And with companies now all-in on their reliance of computer systems and connected devices to conduct business, it is almost as if the ransomware phenomenon was just waiting for all of the pieces to be in place before its violent outbreak.

Nowadays, you can't avoid ransomware in the headlines. Whether it's a new variant, a new study or a new research discovery, ransomware seems to be front in centre in the actions of many of today's cybercriminals. Sadly, there is no magic wand to reversing its course, but there are steps you can take to limit your exposure.

Remember, ransomware attackers want to make a quick buck and roam the path of least resistance to get there. In the video above, Threat Intelligence Manager Karl Sigler describes some of the steps you can take to become a less-optimal victim.

Dan Kaplan is manager of online content at Trustwave and a former IT security reporter and editor.

Latest Trustwave Blogs

Unlock the Power of Your SIEM with Co-Managed SOC

Security information and event management (SIEM) systems play a pivotal role in cybersecurity: they offer a unified solution for gathering and assessing alerts from a plethora of security tools,...

Read More

Trustwave SpiderLabs: LockBit 3.0 Ransomware Most Common Malware Used to Attack the Manufacturing Sector

As the manufacturing sector continues its digital transformation, Operational Technology (OT), Industrial Control Systems (ICS), and Supervisory Control and Data Acquisition (SCADA) are becoming...

Read More

Trustwave’s Observations on the Recent Cyberattack on Aliquippa Water Treatment Plant

The attack last week on the Municipal Water Authority in Aliquippa, Penn., that gave threat actors access to a portion of the facility’s pumping equipment has spurred the Cybersecurity &...

Read More