Defense in Depth

Ransomware


Listen Later

All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ransomware/)

Why is Ransomware so prevalent? Why are so many getting caught in its net? And what are some of the best tactics to stop its scourge?

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the creator of CISO Series and Allan Alford (@AllanAlfordinTX). Our sponsored guest for this episode is Brian Vecci (@BrianTheVecci), field CTO, Varonis.

Thanks to this week’s podcast sponsor, Varonis.

The most powerful way to find, protect, and monitor sensitive data at scale. Get total control over your unstructured data in the cloud and on-premises. See it in action in a live cyberattack simulation lab.

On this episode of Defense in Depth, you'll learn:

  • The ability to exploit the stealing of data takes work. Ransomware requires no knowledge.
  • Ransomware targets the lowest common denominator, just data in general. The attackers often don't need to know much about the data.
  • Ransomware is extremely dangerous when it goes after shared data which probably isn't being monitored.
  • The more savvy ransomware criminals can live dormant in a system, learn where the most valuable data is, and be able to know how much a company can pay.
  • The solution to fighting back requires one to understand that ransomware targets people and files. It's the combination of the two that makes ransomware particularly dangerous. Your best bet to mitigate ransomware's damage is to limit users' file access. Not all users need to be able to access everything at all times.
  • Many security professionals believe the solution to ransomware is just good security hygiene and patching. While patching does narrow your attack surface, it doesn't make you immune to ransomware.
  • Unlike most cybercrime, ransomware is noisy. The attackers want you to know that they're there so you'll pay up.

...more
View all episodesView all episodes
Download on the App Store

Defense in DepthBy David Spark, Steve Zalewski, Geoff Belknap

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

73 ratings


More shows like Defense in Depth

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,979 Listeners

Risky Business by Patrick Gray

Risky Business

365 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

626 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

366 Listeners

Hacked by Hacked

Hacked

183 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,009 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

312 Listeners

Click Here by Recorded Future News

Click Here

413 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,879 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

166 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

43 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

167 Listeners