Contact Us      General Enquiries: +44 (0) 1273 834 000   Support / Service Desk: +44 (0) 113 360 9696

PAV IT

  • About Us
    • PAV GDPR Statement
    • Company History
    • Careers
  • IT Certainty
    • Legal Sector
    • Manufacturing Sector
    • Customer Testimonials
    • Case Studies
  • Services
    • IT Support & Monitoring
    • Project Delivery
    • Cloud Services
    • Backup and Disaster Recovery
    • Application Packaging
  • News & Events
    • BLOG
    • Events
    • Newsletters
  • Technology Solutions
    • Communication and Collaboration
    • Modern Workspaces
    • Data and Governance
CONTACT SALESsupport
  • Home
  • Our latest Blogs
  • Blog
  • Best Practices to Block Ransomware Attacks
February 28, 2021

Best Practices to Block Ransomware Attacks

Thursday, 31 October 2019 / Published in Blog

Best Practices to Block Ransomware Attacks

Ransomware attacks are only increasing in complexity and are getting more efficient at exploiting network and system vulnerabilities, leaving organizations with a significant clean-up bill. Modern firewalls are highly effective at defending against these types of attack, but they need to be given the chance to do their job. In this whitepaper we will discuss how these attacks work, how they can be stopped and best practices for configuring your firewall and network to give you the best protection possible.

Best Practices for Firewall and Network Configuration

  • Ensure you have the right protection, including a modern high-performance next-gen
    firewall IPS engine and sandboxing solution.
  • Lockdown RDP with your firewall. Your firewall should be able to restrict access to VPN
    users and whitelist sanctioned IP addresses.
  • Reduce the surface area of attack as much as possible by thoroughly reviewing and
    revisiting all port-forwarding rules to eliminate any non-essential open ports. Every open
    port represents a potential opening in your network. Where possible, use VPN to access
    resources on the internal network from outside rather than port-forwarding.
  • Be sure to properly secure any open ports by applying suitable IPS protection to the
    rules governing that traffic.
  • Apply sandboxing to web and email traffic to ensure all suspicious active files coming
    in through web downloads and as email attachments are being suitably analyzed for
    malicious behaviour before they get onto your network.
  • Minimise the risk of lateral movement within the network by segmenting LANs into
    smaller, isolated zones or VLANs that are secured and connected together by the firewall.
    Be sure to apply suitable IPS policies to rules governing the traffic traversing these LAN
    segments to prevent exploits, worms, and bots from spreading between LAN segments.
  • Automatically isolate infected systems. When an infection hits, it’s important that your
    IT security solution be able to quickly identify compromised systems and automatically
    isolate them until they can be cleaned up (either automatically or through manual
    intervention).
  • Use strong passwords for your remote management and file sharing tools that are not
    easily compromised by brute-force hacking tools.

 

 

If you would like to find out more detail about the solution, you can also give one of our friendly team a call on 01273 834 000.

Tagged under: #networksecurity, bruteforce, cyberawareness, cybersecurityawareness, cybersecuritynews, cybersecuritytips, databreach, dataprotection, datasecurity, itsecurity, malware, ransomware

What you can read next

Improving Threat Detection Through Integration
Imperial College London uses Microsoft Teams to connect in COVID
Mimecast Email Security

Recent Posts

  • Improving Threat Detection Through Integration

    The Value Of Cybersecurity Tools Can Be Greater...
  • Small Businesses are Facing Big Cybersecurity Challenges in 2021

    Lots of things have changed in the past year, b...
  • Designing in Automation and Productivity to Support the Modern Workplace

    With the advent of WFA (work from anywhere), th...
  • Six Tips for Working from Home Productivity

    This last year has taught us a number of lesson...
  • Designing in Automation and Productivity to Support the Modern Workplace

    Join our virtual event on the afternoon of Thur...

Categories

  • Blog
  • Cisco
  • Events
  • IT Certainty
  • IT's About Time
  • Microsoft
  • Networking
  • News
  • Newsletters
  • Other News

A leading IT infrastructure solution and support provider that has been delivering flexible and modular solutions and consultancy to businesses across the UK since 1988.

GET IN TOUCH

  • General Enquiries: +44 (0)1273 834 000
  • Support Desk: +44 (0)1273 834 433
  • Email: info@pav.co.uk
  • PAV I.T. Services
  • Mending Rooms, Sunny Bank Mills, Farsley,
  • Pudsey, West Yorkshire, LS28 5UJ
  • View on Google Maps
  • About Us
    • PAV GDPR Statement
    • Company History
    • Careers
  • IT Certainty
    • Legal Sector
    • Manufacturing Sector
    • Customer Testimonials
    • Case Studies
  • Services
    • IT Support & Monitoring
    • Project Delivery
    • Cloud Services
    • Backup and Disaster Recovery
    • Application Packaging
  • News & Events
    • BLOG
    • Events
    • Newsletters
  • Technology Solutions
    • Communication and Collaboration
    • Modern Workspaces
    • Data and Governance

Pav IT © 2019 All rights reserved.

  • GET SOCIAL
TOP