SlideShare a Scribd company logo
1 of 12
Presented by: Jeremy M. Livingston
Presented on: 9/12/2019
Scottish Rite CyberSecurity
Bio: Jeremy M. Livingston
• CISSP, Security+, MCSE
• Masters in Cybersecurity
– Current Doctorate student
• AVP & CISO NJ Edge
• vCISO at Fairleigh Dickinson University
• Security Advisor to Rutgers
• Senior Partner – Fortium
• CISO at Food & Drug Administration
• CISO at Federal Housing Finance Agency
• Security Manager - NASA Goddard
• Cyber Risk Manager - National Nuclear Security Agency
• Senior Information Security Analyst – Executive Office
of the President, The White House
• US Navy Veteran
• Junior Warden of Patmos-Solomon’s #70 in Savage MD
What is a Cyber Risk?
Vulnerability + Threat = Risk
Types of attacks
• Ransomware
– Advanced Ransomware w/ data exfiltration
• Phishing/spear-phishing
• Spoofing
• Drive-by
Recent Attacks
• Wallenpaupack Area School Districts
• Stevens University
• Regis University
• Monroe College
• City of Tyler TX
• Lake City FL
• Riviera Beach FL
• Baltimore City MD
• Cockrel Hill TX
• Sarasota FL
• Entercom Media Corporation
• Texas Department of Information Resources
• Flagstaff AZ School District
• Regis University
How do we protect ourselves?
Preventative Measures
• Audit your network for external-facing remote desktop protocol (RDP) and terminal
services and turn them off where possible. If you cannot turn the services off, ensure
they are patched, enable two-factor authentication, and change the default ports.
Limit RDP access to only those users who have a business need for it, and secure
access through a virtual private network (VPN) or Remote Desktop gateway.
• Enable strong passwords and account lockout policies to defend against brute-force
attacks. Log and monitor RDP logins and attempted logins.
• It is a best practice to turn on two-factor authentication for external access to all
applications. This is particularly true for sensitive ones such as email, payroll, or
benefits providers, RDP, and VPNs.
• Ensure anti-virus software is up-to-date. Use a separate password to protect anti-
virus settings.
• Regularly train employees to avoid phishing attempts and not to open unsolicited
attachments and links, particularly from unknown sources.
• Periodically test employees through phishing campaigns, monitor the effect on
response rates, and consider formal sanctions policy (after consultation with HR and
legal counsel) for repeat offenders.
Preventative Measures 2
• Block emails with .jl, .wsf, and .zip extensions and macros at your email gateway
level. If possible, disable the following commonly used attack vectors: Adobe Flash
Player, Java, and Silverlight.
• Block macro-enabled malware files from running on Microsoft Office programs like
Word, Excel, or PowerPoint by using group policy settings.
• Disable SMBv1 on all Windows systems.
• Disable Powershell on workstations.
• If you use Jboss, review the developer information on configuring and hardening it.
• Evaluate whether application whitelisting makes sense for your systems.
• Disable autorun/autoplay functionality on your OS to prevent malicious software from
running on your computer.
• Enable automated patches for OS and browsers where possible.
• Robust network segmentation can reduce the impact/spread of ransomware.
• Enable strong identity and access management, with the of established principles of
least privilege (“need to know”), and limit local administrative rights.
Preventative Measures 3
• IDS/IPS to monitor signs of malicious activity.
• Implement (and test) a data backup and recover plan to maintain copies of sensitive
or proprietary data in a separate and secure location (offline if possible). Backup
copies of sensitive data should not be readily accessible from local networks.
• Run advanced endpoint protection software. This can prevent the infection, or help
detect the infiltration as it is happening.
• Some type of DNS cleansing service (ransomware reaches out to a command and
control (C&C) server for encryption keys etc).
• Advanced Firewalls with automatically updated block lists (many ransomware
programs will fall back to a hard-coded IP if the DNS lookup fails).
• Have contracts in place with needed vendors prior to an incident. Whether it’s
hardware replacement or surge capacity for the increased workload, you won’t have
time in the middle of an incident and you won’t get the best rates.
• *** USER TRAINING *** the most effective defense is an engaged and
knowledgeable workforce who know what to look for
Questions/Comments/Discussion
Contact:
Jeremy M. Livingston
jeremylivin@gmail.com
202-230-2947 (mobile)

More Related Content

Similar to Scottish Rite Security Presentation.pptx

How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers Precisely
 
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - EndpointsWebinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - EndpointsStorage Switzerland
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityAIS Network
 
Steven Porter Seville | Ideas about Computer clouding
Steven Porter Seville | Ideas about Computer cloudingSteven Porter Seville | Ideas about Computer clouding
Steven Porter Seville | Ideas about Computer clouding'Self-Employed'
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Gross, Mendelsohn & Associates
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETYSairam
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management ProgramTripwire
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxTier3MD
 

Similar to Scottish Rite Security Presentation.pptx (20)

How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers
 
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - EndpointsWebinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 
Steven Porter Seville | Ideas about Computer clouding
Steven Porter Seville | Ideas about Computer cloudingSteven Porter Seville | Ideas about Computer clouding
Steven Porter Seville | Ideas about Computer clouding
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
FBI Ransomware Report
FBI Ransomware ReportFBI Ransomware Report
FBI Ransomware Report
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program
 
презентация1
презентация1презентация1
презентация1
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Web Security
Web SecurityWeb Security
Web Security
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Declaration of malWARe
Declaration of malWAReDeclaration of malWARe
Declaration of malWARe
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptx
 

Recently uploaded

NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...Amil baba
 
Angels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxAngels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxLizelle Coombs
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxHenryBriggs2
 
Make Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolMake Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolSERUDS INDIA
 
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)(格鲁斯特大学毕业证学位证成绩单-烫金工艺)
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)twfkn8xj
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfCharlynTorres1
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleSERUDS INDIA
 
办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...ResolutionFoundation
 
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...Christina Parmionova
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILChristina Parmionova
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingSERUDS INDIA
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Sonam Pathan
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Christina Parmionova
 

Recently uploaded (20)

NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
 
Angels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxAngels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptx
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptx
 
Make Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolMake Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong Kurnool
 
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)(格鲁斯特大学毕业证学位证成绩单-烫金工艺)
(格鲁斯特大学毕业证学位证成绩单-烫金工艺)
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor People
 
办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...
 
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donating
 
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.
 

Scottish Rite Security Presentation.pptx

  • 1. Presented by: Jeremy M. Livingston Presented on: 9/12/2019 Scottish Rite CyberSecurity
  • 2. Bio: Jeremy M. Livingston • CISSP, Security+, MCSE • Masters in Cybersecurity – Current Doctorate student • AVP & CISO NJ Edge • vCISO at Fairleigh Dickinson University • Security Advisor to Rutgers • Senior Partner – Fortium • CISO at Food & Drug Administration • CISO at Federal Housing Finance Agency • Security Manager - NASA Goddard • Cyber Risk Manager - National Nuclear Security Agency • Senior Information Security Analyst – Executive Office of the President, The White House • US Navy Veteran • Junior Warden of Patmos-Solomon’s #70 in Savage MD
  • 3. What is a Cyber Risk? Vulnerability + Threat = Risk
  • 4.
  • 5. Types of attacks • Ransomware – Advanced Ransomware w/ data exfiltration • Phishing/spear-phishing • Spoofing • Drive-by
  • 6.
  • 7. Recent Attacks • Wallenpaupack Area School Districts • Stevens University • Regis University • Monroe College • City of Tyler TX • Lake City FL • Riviera Beach FL • Baltimore City MD • Cockrel Hill TX • Sarasota FL • Entercom Media Corporation • Texas Department of Information Resources • Flagstaff AZ School District • Regis University
  • 8. How do we protect ourselves?
  • 9. Preventative Measures • Audit your network for external-facing remote desktop protocol (RDP) and terminal services and turn them off where possible. If you cannot turn the services off, ensure they are patched, enable two-factor authentication, and change the default ports. Limit RDP access to only those users who have a business need for it, and secure access through a virtual private network (VPN) or Remote Desktop gateway. • Enable strong passwords and account lockout policies to defend against brute-force attacks. Log and monitor RDP logins and attempted logins. • It is a best practice to turn on two-factor authentication for external access to all applications. This is particularly true for sensitive ones such as email, payroll, or benefits providers, RDP, and VPNs. • Ensure anti-virus software is up-to-date. Use a separate password to protect anti- virus settings. • Regularly train employees to avoid phishing attempts and not to open unsolicited attachments and links, particularly from unknown sources. • Periodically test employees through phishing campaigns, monitor the effect on response rates, and consider formal sanctions policy (after consultation with HR and legal counsel) for repeat offenders.
  • 10. Preventative Measures 2 • Block emails with .jl, .wsf, and .zip extensions and macros at your email gateway level. If possible, disable the following commonly used attack vectors: Adobe Flash Player, Java, and Silverlight. • Block macro-enabled malware files from running on Microsoft Office programs like Word, Excel, or PowerPoint by using group policy settings. • Disable SMBv1 on all Windows systems. • Disable Powershell on workstations. • If you use Jboss, review the developer information on configuring and hardening it. • Evaluate whether application whitelisting makes sense for your systems. • Disable autorun/autoplay functionality on your OS to prevent malicious software from running on your computer. • Enable automated patches for OS and browsers where possible. • Robust network segmentation can reduce the impact/spread of ransomware. • Enable strong identity and access management, with the of established principles of least privilege (“need to know”), and limit local administrative rights.
  • 11. Preventative Measures 3 • IDS/IPS to monitor signs of malicious activity. • Implement (and test) a data backup and recover plan to maintain copies of sensitive or proprietary data in a separate and secure location (offline if possible). Backup copies of sensitive data should not be readily accessible from local networks. • Run advanced endpoint protection software. This can prevent the infection, or help detect the infiltration as it is happening. • Some type of DNS cleansing service (ransomware reaches out to a command and control (C&C) server for encryption keys etc). • Advanced Firewalls with automatically updated block lists (many ransomware programs will fall back to a hard-coded IP if the DNS lookup fails). • Have contracts in place with needed vendors prior to an incident. Whether it’s hardware replacement or surge capacity for the increased workload, you won’t have time in the middle of an incident and you won’t get the best rates. • *** USER TRAINING *** the most effective defense is an engaged and knowledgeable workforce who know what to look for

Editor's Notes

  1. CIA Triad
  2. SMB – Server message block, a higher level protocol Microsoft uses for file sharing