A Ghost Stole my Data!

Bricker Graydon LLP
Contact

Bricker Graydon LLP

They appeared. They caused a fright. And then they disappeared… along with all of your data. While not a ghost, that is how most hacking groups operate and their ghostly presence is growing across the globe.

Rapid7, a leading cyber security solutions provider, reported that there were more than 2,500 ransomware attacks in the first six months of 2024 – more than 14 publicly reported attacks a day – and that does not account for unreported attacks (which we know happens frequently). So, how do you protect yourself from being the next victim of these ghostly attacks?

First, back up that data! We’ll be the first to admit that the frequency and quality of your backups play little role in whether you suffer a cyber-attack. However, the quality of your data backups can certainly mitigate the impact of that attack. The more frequently you back up your data, on a separate server not connected or accessible from your main systems, the better. Remember, one of the first things that a hacker will do is encrypt all of your data. If you have back-ups on a separate system, you can get back to business quicker with little data loss.

Second, avoid generic passwords and change passwords frequently! This is, perhaps, the lowest-hanging fruit. If your systems, or the users of your systems, use weak or stale passwords, they’re easy to crack. If that’s the case, then it’s time for an update. Passwords should have specific character lengths, include special characters, and be changed at least twice a year. Remember, small changes make a big difference. If you like a password that incorporates, say, your dog’s name, consider R0v3r instead of Rover (just be sure to make your beloved dog password much longer than just a name!).

Third, assess your risk! Partner with your IT department to identify critical vulnerabilities, map potential entry points for malware, and evaluate existing security measures. Deploy robust endpoint protection platforms that provide real-time alerts for unauthorized access attempts, combined with regular system monitoring and detailed access logging.  The goal here is to keep out as much as you can and to respond quickly if (when) something gets into your IT environment. 

Fourth, break out your ghost buster training materials! All users should be trained annually and tested frequently with mock phishing emails. Your users are both your greatest strength and your greatest cyber vulnerability. They must be trained, at a minimum, to understand what suspicious behavior and content looks like and what to do if they come across it. Overreporting isn’t half as scary as underreporting.

Fifth, have a plan. No matter how much you prepare, train, and work to prevent a cyber-attack, the fact is, they happen every day. When they do, be sure to have an incident response plan that you’ve tested and reviewed with your team at least annually. Don’t have an incident response plan? Now’s the time. While there are plenty of templates online, make sure you customize yours for your organization.

While these steps are not fully ghost-proof, they can be used to both help prevent cyber-attacks and minimize those that occur. Cybercriminals are everywhere, just waiting for their next victim, don’t let your organization be it.

“Ghosts are all around us. Look for them, and you will find them”- Ruskin Bond. The same goes for cybercriminals.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Bricker Graydon LLP

Written by:

Bricker Graydon LLP
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Bricker Graydon LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide