Intelligent CIO Middle East Issue 88 | Page 76

t cht lk manipulate someone into divulging confidential information . One common social engineering tactic is to send emails or text messages to scare the target into sharing sensitive information , opening a malicious file or clicking on a malicious link .

t cht lk manipulate someone into divulging confidential information . One common social engineering tactic is to send emails or text messages to scare the target into sharing sensitive information , opening a malicious file or clicking on a malicious link .

What is ransomware mitigation ?
Attempted attacks and data breaches are inevitable and no organisation wants to be forced to decide between paying a ransom and losing important data . Fortunately , those aren ’ t the only two options . The best path forward is to take appropriate steps to safeguard your networks , which will lessen the chances your enterprise will be hit with ransomware . This approach requires a layered security model that combines network , endpoint , Edge , application and data centre controls , as well as updated threat intelligence .
In addition to implementing the right security tools and processes , don ’ t forget the role cybersecurity education plays in your mitigation strategy . Teaching employees how to spot a ransomware attack – and educating them about strong cyberhygiene practices in general – is a great defence against clever attackers .
“ Teach employees how to spot signs of ransomware , such as emails designed to look like they are from authentic businesses , suspicious external links , and questionable file attachments .”
Understanding the risks that make ransomware mitigation necessary
Look around any organisation and you ’ ll likely find security ‘ gaps ’ that increase the chances of a business falling victim to a ransomware attack . Here are several common challenges security teams and their organisations face , which can make them more vulnerable to cyberincidents .
• Lack of cyberhygiene knowledge among employees : Human behaviour continues to be a significant factor in most security incidents . Beyond understanding the signs of ransomware , a lack of general cybersecurity education among employees can put your organisation at risk . According to the Verizon 2022 Data Breach Investigations Report , 82 % of breaches that occurred in the past year involved the human element .
• Weak password policies : Insufficient policies relating to employee credentials – or having no policy – increase the likelihood that an organisation will experience a security breach . Compromised credentials are involved in nearly 50 % of attacks .
• Insufficient security monitoring and processes : No single tool offers everything your security team needs to monitor for and protect against potential cyberincidents such as ransomware . A layered security approach can help you adequately manage your enterprise ’ s risk .
76 INTELLIGENTCIO MIDDLE EAST www . intelligentcio . com