Intelligent CISO Issue 68 | Page 69

There are no shortcuts in these situations and rebuilding systems is almost always required .
decrypting myths
necessary for early detection of attacks . Our data shows most attacks occur off-hours and on weekends , further demonstrating the importance of 24 / 7 monitoring and response .
What strategies should retail organisations adopt to expedite their recovery processes while maintaining security and resilience ?
The first and most important step is to remove the criminals ’ access to the network and to immediately begin restoring critical systems , preferably from verifiable backups . Having an incident response service to consult with during this process can often save lots of time as they know where to look and the most optimal order for restoring broken infrastructure .
How can practices such as ZTNA be integrated into the day-to-day operations of retail businesses and what benefits can they expect to see from such measures ?

There are no shortcuts in these situations and rebuilding systems is almost always required .

their systems and use backups to fully restore systems , often after a delay for arranging payment and struggling with the attacker supplied tools leading to far longer recovery time , which in the end costs money .
What proactive measures can retail businesses implement to prevent their data from being encrypted in the first instance ?
There are many important factors , but the two most obvious are patching and employing phishing resistance Multi-Factor Authentication ( MFA ). Additionally , having XDR tools deployed on all servers and workstations gives the security team visibility and telemetry
ZTNA helps massively at reducing or eliminating lateral movement . All ransomware attacks rely to some degree on lateral movement and we observe upwards of 80 % of ransomware attacks are ‘ remote ’, meaning the encryption software is running a computer other than the one holding the sensitive data . Use of ZTNA of all services is a very effective approach to reducing the harm of being compromised by a ransomware group .
Can you talk us through some of the best practices to help defend against ransomware and other cyberattacks ?
Patching , MFA and monitoring top the list . The other major failure point for many organisations is unprotected and unmonitored assets . Attacks can be launched from the shadows and are very difficult to protect against . u www . intelligentciso . com
69