Rethink IT security | Malware
It's time to change what we think about securtiy

How to avoid malware and ransomware infections

If recent experience with attacks like WannaCry and Petya are anything to go by, malware is an enormous problem. And it's not going away any time soon.

Ransomware has officially become the most profitable form of malware in history, according to the Microsoft Security Intelligence Report, and ransomware attackers are disproportionately targeting Europe.
Victims of ransomware have a slim, very slim, chance of recovering their data if they pay attacks a fee, which often runs into hundreds of Euros. But even if you get the data back, the hassle, cost and resulting downtime is significant.
That's why, when it comes to malware and ransomware, a gram of prevention is better than a kilo of repairs. It's time to evaluate your cybersecurity defences and get them up to scratch.

TAKE THE CYBERSECURITY ASSESSMENT download infographic

Here is our checklist for protecting your business:

Evaluate your cybersecurity.

Taking some time to self-assess your organisation's cybersecurity defenses can help you understand where your weak spots are update your IT security policy accordingly.

Protect your devices.

Make sure all your computers, phones, tablets and servers have up to date operating systems, effective anti-virus software and firewalls. Monitor them with management software such as Microsoft Enterprise Mobility + Security.

Monitor your network.

Install intrusion detection and intrusion prevention software on your network to watch for unusual behaviour. Attackers can remain undetected for more than six months, so look for early signs of intrusion such as logins from impossible locations and automated or repetitive behaviour.

filter your email

Filter your email and internet connection.

It's old, familiar advice but still essential: use a firewall, email malware scanning and website scanning software in the cloud or at the gateway between your network and the internet to block malware. Make sure remote users emote users, servers, unattended systems and handheld devices are covered too.

shadow IT

Get a grip on cloud applications and shadow IT.

Cloud applications, SaaS and bring-your-own-device (BYOD) policies create a huge challenge security. To address this challenge, assess the current use of sanctioned and unsanctioned SaaS apps and embrace BYOD while implementing security controls that help users stay secure and productive on the platforms they love.

reduce the risk

Reduce the risk of credential compromise through education.

Hardware and software is important, but so is peopleware. Teach your staff IT security best practices with regular refresher courses, encourage complex passwords and enforce multi-factor authentication to avoid the dangers of social engineering and data leakage.

backup your data

Back up your data and perform test restores.

A good backup is an important last line of defence. You don't need to pay a criminal to unencrypt your files if you have another copy that wasn't infected with ransomware.

Get professional help.

IT security is a business issue but you can get expert help and advice to deal with the technical details. Microsoft’s network of Partners can help you write, check and implement a comprehensive IT security plan.

Enforce security policies with the latest technology.

Criminals work hard to find new vulnerabilities to exploit and new malware to attack businesses. In the arms race with malware authors, you can’t afford to fall behind and use out of date technology. Take a look at www.microsoft.com/secure to get a holistic approach to protecting your data.

Additional Resources

Story of the month

Assess your security posture

Online cybersecurty self-assessment

download e-bookEvaluate your cybersecurity >

How SAM helps cybersecurity

IDC finds that Software Asset Management can help address cybersecurity issues

read the report READ THE REPORT >

Might be interesting too:

Story of the month

Data Leaks
and it pours

Learn more about data leakage and prevention >
Story of the month

Your weakest
links exposed

Discover how external attacks can affect business operations >
Story of the month

Peopleware:
a business risk

Learn more about managing your endpoints >
Story of the month

Some software
is not all it seems

Learn more about the benefits of SAM >
back to homepage BACK TO HOMEPAGE