WannaCry was different in its origin – not too many exploits derive from the US intelligence community. And it was different in scope (200,000 victims makes for a pretty good infection rate).
But in a lot of important ways, WannaCry was more of the same.
– Its ransom demands were modest.
– It rendered files unusable.
– It created a major fire for unprepared organizations.
How prepared is your company for the next Big Attack? Are your people appropriately on guard against phishing exploits? Do you have the proper system defenses in place? How quickly will you be able to detect an intrusion? And how rapidly can you respond and recover?
We can tell you.
SLPowers, in partnership with our sister company, TRUE Digital Security, has developed a Ransomware Readiness Assessment to help you address this growing security threat, and identify gaps for remediation.
We’ll evaluate your organization’s preventive, detective, and corrective controls, and highlight shortcomings that make you more vulnerable.
– Antivirus deployment and configuration
– Firewall deployment and configuration
– Email-based virus prevention
– Patch management and other workstation controls
– End user privileges
– Employee training
– Host-based monitoring
– Network-based monitoring
– Event correlation capabilities
– Data backups
– Test restoral policies and results
– Analysis of Recovery Point Objectives
– Analysis of Recovery Time Objectives
– Incident response procedures
At the conclusion of our assessment we will present two reports. An executive summary will focus on the business implications and liabilities inherent in our findings. And a technical report will document details of our findings and make prioritized recommendations for improvement.
No one in the intelligence, IT, or law enforcement communities believes WannaCry will be the last, or the largest, mass attack for very long. The only surprise will be how many companies fail to prepare.