Monday, March 1, 17:57
Home security The Zero Trust approach is the solution to ransomware attacks

The Zero Trust approach is the solution to ransomware attacks

Zero Trust: The ransomware scourge is not new, but there have been a number of new ones in recent months attacks to city governments. A prime example is Baltimore, which faced a long system failure in May and June after refusing to pay the ransom required. The attack, in total, cost 18 millions of dollars to both recover and improve defense.

Zero Trust ransomware

While the FBI recently stated that it does not have enough evidence to suggest that one sector is being targeted more than any other, that attacks on municipalities are often more visible because they cannot be resolved as quietly as in the private sector - creating chaos for citizens by cutting payments licenses, and require taxpayer funding for repair and recovery.

Municipalities also tend to be more sensitive than large businesses because they often have limited technological budgets, poor management online security often characterized by outdated and unpatched systems and lack of expertise in the field cyberspace tasked with managing challenges or solving problems. These reasons create challenges that leave small and medium-sized cities unprotected in the hands of cybercriminals and other hostile states.

Zero Trust

The IoT is it destroying us?

Some of the basic steps you need to take to combat ransomware are network segmentation, which is still one of the best ways to prevent malware infection.

In fact, microdistribution is even more critical as the number of devices increases and production networks, creating more new possible vulnerabilities as attacks can expand.

The IoT challenge is more prominent in the healthcare industry. Like municipalities, healthcare organizations have become important targets of ransomware attacks in recent years. Many hospitals use a wide range of new and old technologies, and employees often do not know what systems are running on the medical devices they use, have no information about security protocols or recommended security upgrades, and would not recognize if a device being used has been compromised.

Smaller hospitals, especially those located in rural areas, may have neither the awareness nor the resources to hire cybersecurity staff or update their systems. Although hospitals are highly focused on protecting the confidentiality of patient health data, often paying less attention to the safety of medical devices that do not contain patient information.

Dealing with the rapidly evolving threat environment is becoming an increasingly difficult task given the explosive development of IoT and the impending future 5G.

Be Proactive - Change to Zero Trust

For decades, the internet has been operating under a hypothetical model of trust, where you are assumed to be who you say you are until the opposite is proven. Given the current reality and the fact that cyber threats will continue to surpass the defenses, any organization that continues to operate under this model risks compromising the security of its data and networks.

Moving on to a Zero Trust model that incorporates microdistribution, municipalities and hospitals can create a much more difficult environment for them hackers. A zero-trust architecture requires authorization for any person or device trying to connect to a network or access network resources, even users who are already within the perimeter of the network. Each entity attempting a network connection must be authenticated before the connection is completed and after authorization. access, this identity must be used to further control access to critical servers and data.

As IoT and mobile devices increase the chances of attack, leading to an increased proliferation of ransomware attacks and other cyber threats, organizations need to ensure that a single infected system cannot compromise everything else. Implementing secure segmentation to achieve a zero-trust network environment will help cities and hospitals defeat these attacks - and significantly reduce the risk of having to make a costly ransom payment or embark on a massive restoration and reconstruction. systemic.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS