Expert Reaction On Diamond Comic Distributor Ransomware Attack | #malware | #ransomware


Every day we are confronted with news about another ransomware attack where the threat actor has infected an endpoint and moved laterally across the network, causing significant damage. The Diamond Comic Distributors cyber-attack is no exception, and a reminder to organisations the ease in which ransomware attacks can affect numerous markets worldwide. The American comic book distributor reported that the attack affected their ordering process and communications, which increased

…..Read More

Every day we are confronted with news about another ransomware attack where the threat actor has infected an endpoint and moved laterally across the network, causing significant damage. The Diamond Comic Distributors cyber-attack is no exception, and a reminder to organisations the ease in which ransomware attacks can affect numerous markets worldwide. The American comic book distributor reported that the attack affected their ordering process and communications, which increased issues within their supply chain. 

 

It is essential that organisations invest in technology which protects every single endpoint on the network. If organisations fail to secure their endpoints, then they will expose themselves to further cyber-attacks from ransomware gangs. 

 

Organisations must change their mindset from mitigating attacks to preventing them. Diamond Comics may have mitigated the impacts of the ransomware attack by not storing customer data and financial information, however both their supply chain and reputation have now been damaged.

  

The best protection against attacks such as this one is a multi-layered approach using a variety of solutions. A “prevention-first” mindset is also key – attacks need to execute and run before they are picked up and checked to see if they are malicious, sometimes taking as long as 60 seconds or more. With deep learning CISOs do not need to be superheroes. This more complex approach is harder for criminals to crack, greatly reducing the risk of an attacker entering the network through a vulnerable endpoint.

  Read Less



Original Source link

Posted in Uncategorized

Leave a Reply

Your email address will not be published. Required fields are marked *

nine + 1 =