Protecting Your Network from Ransomware Using 2 Different Security Vendors

Ransomware is where a hacker breaks into your network and then encrypts all or parts of your data so that it can no longer be used. The hacker then demands a ransom in order to provide un-encryption software. These types of malware attacks can and will bring an organization to a screaming halt.

The following tip can substantially lower the risk that your network is attacked by ransomware.

PRO TIP
Use at least 2 different security vendors for your firewall and endpoint protection. The concept is similar to using 2 different types of locks on your doors. A burglar may know how to break into one of the locks, but if there are two types of locks, they may just give up and look for an easier target.

FIREWALLS
We recommend, sell, install and support Fortinet brand firewalls which advanced anti-malware services as well as best-in-breed IT security services.

For small businesses we recommend the Fortigate 60F or Fortigate 61F firewall model that is bundled with their SMB Security Suite. The 61F has a built-in SSD for real-time log storage. The 60F uses Fortinet’s cloud for log storage, which means that some logging data will be lost if there is an interruption in service.

Once you decide which model firewall to get, be sure to have it installed correctly. A faulty configuration can leave your network wide-open to hackers and anyone else who may want to access your data.

ENDPOINT PROTECTION SOFTWARE
We recommend the award-winning Sophos Intercept X Advanced series of products which offers best-of-breed anti-ransomware capabilities. While these products are expensive, we don’t believe in compromising IT security because of price. You can read more about Intercept X Advanced here.

IF YOU ARE ATTACKED BY RANSOMWARE
Recovering from a ransomware attack is best left to the professionals. Dominant Systems has been helping organizations recover from network security issues since we installed our first firewall in 1995.

For prompt, professional, 24x7 ransomware recovery services, contact us as soon as you are aware that you have been attacked.

Previous
Previous

Anatomy of a Scam Email

Next
Next

Creating Strong Passwords