1. Part 3: 5 Steps to Defend Against a Ransomware Attack

    In Part 3 and final post in our Ransomware series, we take a look at how to defend against a ransomware attack. How do you best prime your defences? Cyber crime is big business, often carried out on an industrial scale. While the financial implication of a ransomware attack varies, the business impact is unquestionably large. The […]

  2. Ransomware, part 2: The role of cloud sandboxing in ransomware protection

    In PART 2 of our 3-part series on Ransomware, we look at the role of Sandboxing in ransomware protection. Protection from attack requires a multi-layered approach, incorporating cloud sandboxing to block malicious traffic. What is cloud sandboxing? There can be no doubt that every organisation now requires advanced malware protection. Cloud sandboxing is a dynamic analysis technique designed […]

  3. Zscaler Cloud Sandbox – the best line of defence in evolving ransomware strains

    Following analysis of the WannaCry ransomware attack, Zscaler determined that the initial delivery vector was not over HTTP/HTTPS, in this case. Still, multiple steps were taken to block payloads, avoiding post-infection activity for this Ransomware strain as it morphs. How Zscaler can help with preventative measures Firstly, make sure you have followed our guidance to protect yourself […]

  4. What lessons have we learned from the WannaCry ransomware attack?

    Few will have missed the largescale ransomware attack on 12th May 2017, particularly affecting the NHS, but disrupting operations at more than 100,000 organisations in 150 countries. If we didn’t yet fully comprehend the existing threat from ransomware, we now do – unfortunately. The WannaCryptor ransomware, or ‘WannaCry’ is a highly virulent worm – and […]

  5. What’s the best way to quickly and securely deploy Office 365?

    The Challenge of Running Cloud Applications Securely Organisations are rapidly adopting Office 365 to improve employee productivity, increase flexibility and lower infrastructure costs. However, there are implications for network architecture, bandwidth management, and cloud application visibility. With a traditional hub and spoke architecture you had to backhaul traffic from remote sites and mobile users to the […]

  6. Explainer: How does Ransomware work? The 5 phases of an attack

    In PART 1 of our 3-part series on Ransomware, we look at the 5 distinct phases of a ransomware attack. Protection from attack starts with recognising the compromise indicators Your organisation’s success in defending against a ransomware attack is largely dependent on your level of preparation and the tools you deploy to monitor your systems […]