2019 State of Email Security Report
Actionable steps to improve your organization’s email security and cyber resilience.
Protect from ransomware with Mimecast
As ransomware viruses like Cryptolocker become more prevalent and sophisticated, organizations everywhere are looking for more effective ways to protect from ransomware.
A ransomware virus usually starts with an email – an unsuspecting user clicks the wrong link or opens a malicious attachment and the virus is launched. The attackers take control of systems or data and hold it hostage by blocking access or encrypting it. Organizations can only regain access after paying a ransom.
To protect from ransomware, you need a powerful security solution for email that prevents users from clicking suspicious links or opening weaponized attachments. But because your anti ransomware technology may not be successful 100% of the time, you also need superior backup, archiving and recovery technology that can negate the impact of a ransomware attack by delivering continuous access to your information assets. That's where Mimecast can help.
Mimecast helps you protect from ransomware with a cloud-based solution for email security, archiving and continuity. Mimecast's SaaS-based subscription service helps to minimize the cost and complexity of managing business email while also delivering the tools to let you effectively protect from ransomware.
Mimecast's technology to prevent ransomware uses sophisticated detection engines and advanced threat intelligence to protect your users, data and organization from ever-evolving ransomware attacks and other advanced threats. Mimecast email security also provides defenses against spam, malware and data leaks, and offers easy-to-use tools for securely sending messages and large files.
Mimecast provides a multi-layered approach to protect from ransomware. Mimecast services include:
Learn more about Cryptolocker prevention and about how to protect from ransomware with Mimecast solutions.
What is ransomware?
Ransomware is a type of cybercrime where attackers download malware to a computer that denies access to the system or the files on it until a ransom is paid, usually via crypto currency. Ransomware is typically spread through phishing email or by gaining access to login credentials that enable attackers to access a system and download ransomware.
How to protect a company from ransomware?
How to protect users from ransomware?
Robust security awareness training can help users and their organizations better protect from ransomware attacks. Training makes users aware of the types of phishing email that attackers use in a ransomware attack. When users can spot the social engineering techniques and common phishing indicators such as poor grammar, threatening messages, an urgent tone and requests for sensitive information, they can more easily avoid phishing emails to better protect from ransomware. With proper security awareness training, organizations can significantly limit or eliminate the role of human error in allowing ransomware into a computer system.
How to protect from the impact of ransomware?
Because not every ransomware attack can be stopped, it’s important for organizations to have plans to protect from the impact of ransomware. Frequent backups can enable data to be recovered more easily after a ransomware attack. Continuity services can help to protect from ransomware by ensuring users have continuous access to email and files during an attack and in the days and weeks following. And two-factor authentication protocols make it harder for attackers to use stolen credentials to access computer systems and download ransomware.
How to recover from ransomware?
In the event that your defenses fail to protect from ransomware, knowing what to do when an attack occurs can help to limit the damage. Step one is to immediately isolate any affected computers by disconnecting them from the network and from any storage devices that are shared with other machines. The next step is to identify the strain of ransomware by the language and images that appear on the ransom screen. Ransomware attacks should be reported to federal authorities through local FBI field offices and to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) at www.us-cert.gov/report. Finally, you’ll need a plan to recover your data, either by attempting to decrypt it or by wiping systems clean and restoring data from backup.