How ransomware attacks get on your computer or network

Ransomware actors use a wide range of Tactics, Techniques and Procedures to penetrate your network and infect your computer. How the ransomware got into the organisation.

29% of ransomware infections are via a file download/email with a malicious link.
21% of ransomware infections are via a remote attack on a server.
16% of ransomware infections are via an email with a malicious attachment.
9% of ransomware infections are via misconfigured public cloud services.
9% of ransomware infections are via our Remote Desktop Protocol (RDP).
9% of ransomware infections are via a supplier who works with your organization.
7% of ransomware infections are via a USB/removable media device.

The top entry point for ransomware is through files downloaded or sent to users in spam or phishing attacks. Don’t leave security in the hands of your users. For these types of attacks, it’s best to safeguard your organisation with strong firewall protections.

How to stay protected from ransomware

Use the latest machine learning technology to identify new zeroday variants in any files coming through the firewall.

Firewall IPS with live signature updating to block network exploits.

Use a VPN to enable management of your network remotely without compromising on security.

Locking down your organisation’s remote desktop protocol access, open ports, and other management protocols is one of the most effective steps.

Segment your network, do not use flat network topology.