About Modern Workplace

Explore what's happening at the intersection of business and technology in today's digital-driven world. Hear from industry experts, and get an insider's look at the latest advances in security, mobility, productivity, and more.

Ransomware on the rise

Ransomware on the rise

Last month I wrote about the importance of business continuity through data backup. The worst is not over yet. Here’s why:

New threats are appearing on a daily basis, and attackers are continuously evolving their techniques. If you also put into perspective what we are experiencing in the United Arab Emirates, with Expo 2020, Driverless Cars, and the Government’s speed of Digital Transformation, the UAE in general, and businesses in the UAE are high targets for Ransomware attacks. Here is how it all stacks up:

  • 54% of companies experienced one or more successful attacks that compromised data and/or IT infrastructure. .[1]
  • 77% of those attacks utilized exploits of file-less techniques. (the old days of malicious executables are gone as new attack tools and frameworks continue to lower the barrier to entry). One could argue that up to a third of all attacks are projected to utilize file-less techniques in 2018. .[1]
  • Emails are now increasingly used by hackers, and it is estimated that 1 in every 131 emails, contain a malware.[2]
  • There is a ransomware attack every 40 seconds .[3]

Ransomware is no longer a buzzword and is the latest method of cyber extortion for financial gain that we are hearing about on a daily basis here in the UAE. Ransomware is a type of malware injected into corporate networks by cyber criminals, which prevents users from interacting with their files, applications or systems until a ransom is paid. This is typically in the form of an anonymous currency such as Bitcoin, which is most recently seen by the University of Calgary who had to pay up to $20,000 to wrestle back access to files locked away by malware. The university's email, Skype, wireless networks and other services were targeted by the malware infection.

In recent times, individual computer and mobile device users have long been the unfortunate recipients of ransomware and now the threat has expanded. Ransomware has gained publicity in recent months through media coverage of the numerous ransomware attacks against organizations, which we have seen through hospitals. Cyber criminals have been progressively turning to industries such as healthcare, universities and law firms that possess critical data but may have limited investment in cyber security. Hospital budgets are often allocated towards surgery wards, emergency care and supplies for a large number of patients – not cyber security. This is an easy target for cyber criminals since hospitals cannot operate without the necessary patient data stored in their systems.

What can you do to evade a ransomware attack?

As dangerous as ransomware is, simply being aware and remaining updated with the latest ransomware trends can go a long way in securing your data and systems. Here are some of our top tips on how you can secure yourself from a possible attack.

  1. The solution for ransomware is fairly simple and is your best defense. Back-up, Back-up, Back-up. Check out our Microsoft Azure package for more details for data security and peace of mind.
  2. Use a secure mail gateway, as Ransomware often hides itself in legitimate looking email attachments, often spoofed from email addresses of people you know. Even then scrutinize you incoming mails. If you are not 100% confident about opening an attachment, do not open it. To be on the safe side, you can check the source sites credibility through Trend Micro.
  3. Deploy a layered approach to security by utilizing technologies such as antivirus, web filtering and firewalls. This might not prevent the ransomware completely but will delay the process till you hopefully detect the problem.
  4. Personalize your anti-spam settings the correct way. Most ransomware variants are known to be spreading via eye-catching emails that contain malware attachments.
  5. Make sure you disable file sharing, so the infection will stay isolated to your machine only or try (deleted) disabling remote services. Otherwise, the threat could rapidly propagate across your network.
  6. Immediately disconnect from Wi-Fi and your network if you download a file that you suspect. If quick enough, you could delay the communication with the server before it finishes encrypting your files.

There are whispers that some companies have even been stocking up on bitcoins in the event they are targeted but paying the ransom only encourages attackers to develop more advanced ransomware. DO NOT PAY…

Most organizations would see a defense in-depth strategy being the likely solution, this however does have its flaws as it can see point solutions protecting specific areas of concern on the network. With the introduction of next generation firewalls, organization offer a consolidated joint up approach which will offer protection against all of these point solutions in one single enterprise platform.

Focus on a solution that provides prevention. Key to all of this is that if you are looking at a solution, choose a company that focuses on the known and more importantly the unknown malware. To conclude, tighten security measures, ensure you have up-to-date software, use best practices and clean, protected backup data. Organizations should evaluate backup strategies regularly and test those backups to ensure that recovery is successful which is what we provide here at Media Solutions.

[1] source: Barkley.com

[2] Source: Symantec

[3] Source: Kaspersky

Apps and Infrastructure

Cloud PBX replaces old school On-Premise PBX’s

If your organization is considering purchasing a new PBX system, or is planning to upgrade its existing PBX System, then consider the Microsoft Office 365 Cloud PBX system.

24 Nov 2020

Read More

Business Applications

Advertising workflow refined

Before the introduction of IMD Cloud in the Middle East region, television advertising delivery was a bit of a nightmare. Agencies were caught managing communications between all parties. Here’s why:

23 Nov 2020

Read More

Apps and Infrastructure

From Earth to Cloud

In October 2012, we had predicted that the market for Cloud based IT Services would reach $ 72.0 Billion by 2015. Fast forward to 2016 and the outlook is far more buoyant. IDC now forecasts that the worldwide public IT Cloud Service spend will reach $ 141.2 Billion by 2019, and will grow at a rate of 19.4% year on year which is almost 6x the rate of growth of the overall IT Spend growth.

24 Nov 2020

Read More

Apps and Infrastructure

Optimizing IT Budgets for the New Era

Before the 2009 global financial meltdown, I spent countless hours knocking on doors throughout the Gulf trying to pioneer Cloud Solutions here, and very few were convinced or even listening. Thankfully since then, and with today’s economic belt tightening, the phone is happily ringing off the hook.

24 Nov 2020

Read More

Apps and Infrastructure

To Backup or not to Back-up?

We know that Businesses run on data, however how many businesses have acted to actually protect their core operations if and when disaster strikes? To put it in perspective, let’s look at some mind-blowing statistics on Big Data:

24 Nov 2020

Read More