Intelligent CISO Issue 61 | Page 42

Most recently , cybercriminals have resorted to deceptive phishing , an easier means of tricking someone into clicking a malicious link in a seemingly legitimate email .
EXPERT OPINION

Most recently , cybercriminals have resorted to deceptive phishing , an easier means of tricking someone into clicking a malicious link in a seemingly legitimate email .

Malware can spread when you install an infected program , click an infected link or open a malicious email attachment .
For example , trojan malware disguises itself as legitimate software to enter your system in a similar way that phishing emails impersonate trusted sources . It begins launching malicious agenda once it enters your systems .
With new reports revealing that over 30 million new malware threats occur each year and about 82,000 per day , it is likely that every organisation is at risk of being victimised .
As a best practice , ThreatLocker recommends that organisations first understand that the most frequent cause of malware is phishing . By implementing an email filtering and protection system to reduce the number of phishing attempts that reach your mailbox , you can better protect yourself from phishing attempts and malware attacks .
To tackle this problem , ThreatLocker ’ s Allowlisting solution was built to block all unapproved software including malware from executing without approval from an administrative team .
On using Allowlisting , Joseph Undis , Senior Cloud Engineer at TechCon Consulting , said that it completely replaced the need for AppLocker and provided more control to automatically
update policies leading to fewer management hours .
3 . Ransomware
In line with malware , ransomware is a type of malicious software purposely designed to block access to a computer system or threaten to release your confidential data online until a sum of money is paid .
In the case of lock-screen ransomware , computers or PCs can be frozen out completely with little or no access to files and systems . The code intrudes , encrypts and locks all data and files building a code wall until a sum of money is paid .
Ransomware attackers previously requested payments via Western Union or special text message but recently , attackers demand payments via cryptocurrencies such as Bitcoin .
Ransomware attacks are always disruptive and costly whether you pay the criminals to return access to locked systems or not . In 2021 , the average cost of a ransomware attack to an organisation was estimated at US $ 1.85
42 www . intelligentciso . com