NATDA Magazine Nov/Dec 2019 NM_Nov2019_Final | Page 36
Add software controls to minimize user access
One way you can prevent employees from clicking on a malware
file is with the help of software controls that limit the number
of applications and files a user can run. Consider programs like
AppLocker and EMET to help restrict execution and spread of
malware. Attackers have their favorite methods of delivering
malware into organizations, often by abusing certain Windows
binary files. Knowing whether or not these files are utilized
in your environment will allow you to block them outright or
increase logging and alerting around those files.
Weak passwords. Employees using servers in a
demilitarized zone (DMZ) that is exposed to the internet
could put the network at risk by using weak passwords
that an attacker could guess or compromise
Once an attacker gains access to an externally facing service such
as remote desktop protocol (RDP), Outlook Web Access (OWA),
Citrix Gateway, a VPN, or some other remote access service, they
can attempt to increase their network privileges to the highest
level.
Limit the likelihood of a ransomware attack
For in-depth technical information about how to minimize and
mitigate exposure to ransomware, consider the resources
offered by SANS Internet Storm Center and the U.S. Computer
Emergency Readiness Team. Additionally, there are several key
strategies your organization can use to prevent or limit the impact
of ransomware.
Raise phishing awareness
Malware typically needs a helper to do its job, which means an
employee must open an infected attachment or visit an infected
site to make a phishing attack successful. Educate users on
phishing scenarios and consider internal phishing tests to gauge
employee readiness. Tests should familiarize employees with
common phishing scenarios as well as teach them how to identify
masked links and spoofed sender addresses.
Add strong user controls
You can help mitigate risk by limiting user permissions to only the
programs and systems they need to fulfill their job, including:
Limit local administrator rights to PCs, workstations, and
laptops.
Those logged in with administrator level credentials
should avoid using email, browsing the internet, and any
other general computer use.
Network and domain administrators should be required
to have two sets of credentials — general use and elevated
privileges.
Implement a policy and practice that stipulates
administrators should not log into workstations with
domain administrator rights.
36
Network segmentation
Ransomware often spreads to whatever devices it can communicate
with and control by exploiting unpatched vulnerabilities or
compromised user accounts. Proper network segmentation will
help limit the internal attack surface by preventing communication
between certain device types. Restricting communication
between devices on your network to allow only what is necessary
will greatly reduce the potential impact of a ransomware attack.
Validate the integrity of your backup and restoration
capabilities
Attackers can cause additional damage during an attack by deleting
or encrypting online backups. Consider implementing backup and
restoration procedures that will guard your company against data
loss.
Be sure you have off-line copies of backup and restore files
All electronic backup and restore files should be saved in
a well-secured location
Perform a thorough review of file permissions for network
file shares, and pay special attention to locations storing
electronic backup and restore files
Practice a full system and data restore to verify confidence
in your capabilities
How CLA can help
As part of an overall cybersecurity assessment, CliftonLarsonAllen
professionals can run a vulnerability scan to identify the holes
in your organization’s security. Even more, they can perform a
ransomware preparedness assessment to measure your company’s
ability to defend against and mitigate the impact of a ransomware
infection. To learn more, please visit www.claconnect.com.
Privacy policy, terms of use, and disclaimers (http://www.claconnect.com/
disclaimer/)
CliftonLarsonAllen Wealth Advisors, LLC disclaimers (http://www.claconnect.
com/general/wealth-advisors-disclosures) © 2019 CliftonLarsonAllen. All
rights reserved. “CliftonLarsonAllen” and “CLA” refer to CliftonLarsonAllen LLP.
Investment advisory services are offered through CliftonLarsonAllen Wealth
Advisors, LLC, an SEC-registered investment advisor.
CliftonLarsonAllen is a member firm of the “Nexia International” network.
Nexia International Limited does not deliver services in its own name or
otherwise. Nexia International Limited does not accept any responsibility for
the commission of any act, or omission to act by, or the liabilities of, any of
its members. Each member firm within the Nexia International network is a
separate legal entity. http://www.nexia.com/
NATDA Magazine www.natda.org