Malware Versus Ransomware: What’s the Difference?

Malware is a more powerful force that can damage industries and disrupt entire online environments through hacking and sensitive information leaking. Ransomware is a more targeted approach that aims to take control of people’s computers and lock software and files.
 
To get files back and regain access to a computer, the ransom attacker will ask for a payment. Supposedly, once they receive the payment, they will send a unique key to release it. 
 
Should You Pay The Ransom?
 
There is no one way to answer this question.  The decision to pay ransomware demand should not be taken lightly. It comes with acceptance of several risks and in coordination with legal counsel, cyber insurance and security experts. Should you decide to pay the ransom, you need to be aware of the following key factors:
 
• You could be targeted again in the future
• There is no guarantee that you will get your data decrypted
• Your systems may still be infected
• You may be paying cyber criminals who are carrying out illegal activities just like your incident
 
Irrespective of the ransomware payment decision, it may take a while to return to normal operations. Cyphere , a UK based cyber security and managed services provider, provides the following top tips against malware and ransomware attacks:
 
Tip 1: Prevent Malware Delivery
Email and web filtering to allow required file types and data expected by recipients. By blocking suspicious websites and continuous inspection of internet content, malware transmission can be stopped before it reaches your internal systems. 
Secure remote access is an important to add layered protection for networks. 
 
Tip 2: Prevent Malware Infection 
In line with defence in depth approach, follow secure hardening practices for operating system builds in your environment. 
Patch Management is an important mitigation that ensures all exploitable bugs in your products are patched as soon as possible. Scripting environments should have restrictions to avoid the execution and spread of malware. This includes disabling Office Macros or limiting scripting environments using AppLocker enforced via group policy. 
 
Tip 3: Limit the Impact
Use the principle of least privilege to provide remote access with only low privilege accounts to login. Regularly review permissions for all the staff including internal and external employees. Create separate accounts for corporate and production environments.Segregate obsolete systems from the rest of the network to maintain a small attack surface. 
 
Tip 4: Education
User education and awareness training plays key role in stopping malware. Cyber security importance in the user training should address at the least these facts:
 
• Defending against phishing
• Strong authentication practices 
• Securing your devices
• Reporting incidents 
 
There should be zero exceptions for this awareness training exercise. Topics such as remote working securely, insider threats, cyber security tips for businesses in easy to understand language should be included. Consider your supply chain to ensure better cyber security posture.
 
Tip 5: Backups
Make regular backups of most important data to the organisation. Find out which data is critical to the organisation, and test backup data restore regularly to ensure it is working as expected. At the least, create one offline backup that is stored at a different location (offsite) from your network and systems. 
 
 
Be Prepared
The saying ‘we are too small’ - this isn’t applicable as malware and ransomware attacks target businesses irrespective of their size. Identify the critical assets and determine the impact in case your business is under attack. Identify the attack vectors possible in your business context, and mimic the exercise using third party penetration testing companies. 
 
What To Do When Your Company Is Hacked?
 
Malware Attack: Follow these steps immediately to limit the impact of a malware attack:
 
1. Disconnect the infected systems, devices immediately from all network connections (wired, wireless or mobile).
2. Reset credentials, especially privileged accounts.
3. Securely wipe the infected devices and reinstall the operating system from gold build. In case of an incident you need investigating into, get professional help from third party security providers. 
4. Double check that the underlying system is clean before restoring backup. 
5. Now connect these devices to network to download, install and update the software installed.
6. Install antivirus and run a full scan. Schedule periodic scans and on-access scanning capabilities. 
7. Monitor network traffic across the company to identify any similar behaviors. 
 
Ransomware Attack: A good initiative No More Ransom, supported by Europol European Cybercrime Centre and private companies, provides prevention advice and decryption tools from anti-virus vendors, which may help. 
 
Conclusion
Cybersecurity is a must-have for anyone who is heavily reliant on the internet for lifestyle, work, or leisure purposes. Too many attackers have made a foothold in the cybersphere, which means that staying safe must be everyone’s priority. 
 
Harman Singh: is Managing Consultant at Cyphere Ltd
 
You Might Also Read: 
 
Companies Are Coughing Up Ransom To Recover Their Data:
 
« Anticipating Cyber Attacks
Ireland's Privacy Regulator Is Investigating Instagram »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

Engineering Group

Engineering Group

Engineering is the Digital Transformation Company, a leader in Italy and with over 80 offices across Europe, the United States, and South America.

Secude

Secude

SECUDE is an established global security solutions provider offering innovative data protection for SAP users.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

Bolster

Bolster

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Persona

Persona

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

BluTinuity

BluTinuity

BluTinuity is a premier management consulting firm with a passion for information security, business continuity, incident response, disaster recovery, and HIPAA security.