Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

Store

Poweron Technology Blog

Poweron Technology has been serving the New Mexico area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Identifying Tactics Used to Disseminate Ransomware

Identifying Tactics Used to Disseminate Ransomware

Ransomware is such a massive threat that all businesses should be aware of the latest news and findings regarding how it spreads and how it can be prevented. According to a recent report, the latest modes of transporting ransomware have been revealed. What can your organization do to keep ransomware off of its network? Let’s find out.

The report in question comes from security researchers at Coveware. This report analyzed ransomware attacks throughout the second quarter of 2021 and found that phishing attacks and remote desktop protocol (RDP) attacks were the most common methods of infecting systems with ransomware. It should be noted that these were for the initial methods used by hackers to gain access to systems prior to installing ransomware on the infiltrated networks.

These methods are particularly noteworthy as they are low-cost, high-reward ways for hackers to attempt infiltration of networks. Phishing attacks can be leveraged against countless targets all at once, and remote desktop protocol attacks can be used to brute force accounts using guessed or stolen passwords. While these attacks can be protected against easily enough, it only takes one instance of such an attack being successful to create troubles for targeted organizations.

For your reference, here are the three top threats that give other threats a foothold on your network, as reported by the Coveware report:

  • Phishing: 42%
  • RDP Attacks: 42%
  • Software Vulnerabilities: 14%

Also of note are the types of ransomware that are being spread by hackers. The one that made headlines not too long ago with attacks against Kaseya, REvil, was the top ransomware on the list, followed by Conti, a ransomware used against the Irish healthcare system.

You cannot take risks with ransomware and any other security threats to your business, no matter how small or seemingly insignificant they are. You should utilize any methods possible to optimize your defenses in any way you can. You must make sure that your applications are as up-to-date as possible at all times, your network is secured with comprehensive security solutions, and you have multi-factor authentication enabled to keep compromised passwords or other account credentials from being used as a backdoor to your network.

Poweron Technology can help your business ensure that it has done all that it can to protect your infrastructure. Even if you don’t know where to start, our trusted and knowledgeable professionals will work with your company to keep it safe from security threats of all kinds. We’re not talking about ransomware exclusively—we mean all threats, including viruses, malware, spyware, trojan backdoors, and so much more.

To start taking your network security seriously, reach out to us at (505) 899-4600.

Technology Is Helping Create the “New Normal”
Are Virtual Machines the Next Step for Your Busine...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, November 07, 2024

Captcha Image

Latest Blog

A well-structured framework is essential for establishing effective, consistent policies and strategies. This applies to many areas—including network security. Today, we’re diving into the National Institute of Standards and Technology (NIS...

Contact Us

Learn more about what Poweron Technology
can do for your business.

(505) 899-4600

Poweron Technology
9000 Alameda Blvd NE
Albuquerque, New Mexico 87122

Account Login