Source |
Kovrr |
Identifiant |
8393604 |
Date de publication |
2021-09-12 00:00:00 (vue: 2023-10-10 07:25:35) |
Titre |
Règlements et ransomwares: un aperçu rapide de la vue d'ensemble de ce que les entreprises doivent savoir sur les ransomwares et les réglementations connexes. Regulations & Ransomware: A Quick OverviewAn overview of what enterprises need to know about ransomware and related regulations.Read More |
Texte |
As cybersecurity threats continue to evolve, ransomware has recently come into focus as one of the more prominent and challenging types of attacks to deal with. Not only do companies need to face the security implications of having their data fall into the hands of cybercriminals, but there can be significant costs around paying ransoms and/or recovering systems and files. Plus, paying ransoms can raise some ethical if not legal issues. There are already several existing regulations that enterprises need to keep in mind if hit with a ransomware attack. And as the risk grows, a number of new regulations are under consideration around the world.In this brief overview, weâll explore what enterprises need to know about ransomware and related regulations.What Is Ransomware?Before diving into what to do about ransomware and what regulations to follow, itâs important to understand what ransomware is.âRansomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption,â explains the U.S. Cybersecurity & Infrastructure Security Agency (CISA).In other words, ransomware can lock a user out of their own files/systems, which can bring work to a halt. Even if the ransom is paid and everything gets unlocked, itâs possible that the cybercriminals stole data meanwhile. While some of the more headline-grabbing attacks have been at large, well-known companies, ransomware can essentially affect anyone, regardless of size, industry or location.How to Reduce the Risk of RansomwareAlthough ransomware is on the rise, there are still several steps organizations can take to reduce the risk of a ransomware attack or at least mitigate the damage.âAs with all risks posed by external actors, the likelihood that a ransomware attack is successful can be drastically reduced by tightening the security of the data controlling environment,â notes the European Data Protection Board (EDPB).From updating software and systems with appropriate security patches, to using anti-malware software or related monitoring services, there are many cybersecurity best practices that can potentially keep ransomware out, as the EDPB highlights.If ransomware does take hold, having complete backups can help. As the EDPB notes, the impact of ransomware âcould effectively be contained,â by resetting systems to wipe out the ransomware and then âfixing the vulnerabilities and restoring the affected data soon after the attack.âOrganizations can also get a better handle on ransomware risk via cyber risk quantification (CRQ), such as through Kovrrâs insurance-validated risk models. CRQ works by analyzing factors such as past cyber events and the technologies and service providers that a company uses to then quantify what companies might lose if a cyber attack like ransomware occurs. Part of being prepared means knowing how much is at stake financially, and CRQ can help organizations focus on the areas that present the largest financial risk. âWhat Ransomware Regulations Exist?Current ransomware regulations differ around the world, so the specific rules an enterprise needs to follow depends on factors like what markets they operate in and whether they fall under certain jurisdictions.Communicating AttacksOne of the more notable rules that relates to ransomware is the EUâs General Data Protection Regulation (GDPR), which can still apply to companies outside Europe, such as those that have customers in the EU. Under GDPR, explains the EDPB, a personal data breach needs to be reported to relevant authorities and potentially to the people whose data gets exposed. So, for example, if a ransomware incident involves a cybercriminal locking up files that contain personal information, such as financial or medical records, then the affected company may need to report that to those affected.In the U.S. the |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
2014 2018 about act actors additional affect affected after agencies agency aims all already also amended amendments among analyzing and/or anti any anyone apply appropriate are areas arenât around asks assess assets attack attacks attacksone authentication authorities backups banning basic basis been before behalf being best better bloomberg board breach breaking brief bring business businesses but came can capabilities cases certain challenging cisa colonial come commission communicating companies company comparative complete complication congress consideration considerations considered considering consist contact contain contained continue control controlling cooperate costs could council country critical crq current customers cyber cybercriminal cybercriminals cybersecurity cyberspace damage data deal decryption demand demands depends designed details determine device differ digital discusses diving does doesnât drastically edpb educational effectively electricity encourage encrypt energy enterprise enterprises entirely entities environment essentially ethical europe european euâs even events everything evolve example exchange exist existing explains explore exposed external eye face facilitate facing factor factors fall files files/systems financial financially firms first focus follow following foreign forensics form from future gdpr general get gets given government governments grabbing groundwork grows guides halt handle hands has have having headline help high highlights hit hold host how iclg impact implement implications important incident include including increase individual industry information infrastructure institutions insurance international involved involves involving issues itâs japan journal jurisdictions just keep know knowing known kovrr kovrrâs large largest law lay least legal library like likelihood local location lock locking lose malicious malware many markets material matters may means meantime meanwhile measures medical might mind mitigate modeling models money monitoring more much multi nation national necessarily need needed needs new not notable notes number occurs ofac office olympics one only operate operators organization organizations other out outside overall overview overviewan own paid part past patches patching paying payment payments people personal pipeline posed possible potentially practices precisely prepare prepared preparedness present proactively profile prominent promotion protection protections protectionsin providers publicly quantification quantify quick raise ransom ransoms ransomware ransomware: ransomwarealthough read recently records recovering reduce reduced regarding regardless region regulation regulations related relates relevant rely remain rendering report reported reports requirements requiring research resetting response restoring rise risk risks rules sanctions sanctionsone securities security see sending service services several share sharing significant size software some someone somewhat soon specific stake starting steps stole street strong stronger successful such systems take technologies thatâs them then theyâre think those threats through tightening today touch toward traded trend types unclear under understand unlocked unusable updating user uses using validated victims violating voluntary vulnerabilities wall well weâll what whatâs whether which whose will wipe words work works world âwhat âas âcould âfixing âransomware âset â âorganizations â for â in â plus â while â âwhat â âcompanies â â respecting |
Tags |
Ransomware
Data Breach
Malware
Vulnerability
Prediction
Medical
|
Stories |
|
Move |
|