<
>

2020 Press Releases

February 17, 2020

Fortinet Advises Organisations in Malaysia to Safeguard against Ransomware

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, advised organisations in Malaysia to safeguard against ransomware as cybercriminals are continuously inventing more sophisticated forms and ways of distributing it. 
 
With the addition of two common ransomware variants to the RaaS (Ransomware-as-a-service) model, 
not only ransomware continues to be a clear and present danger to enterprise organisations, but organisations can expect a significant boost in the volume and severity of attacks for the coming year. With the use of RaaS model, the authors of malware are significantly lowering the bar for launching attacks, making ransomware even more accessible and profitable for a growing pool of bad actors.

“Cybercriminals are refining existing malware to evade detection and deliver increasingly sophisticated and malicious attacks. In a world where everything is an “as-a-service,” it is no surprise that RaaS is also growing rapidly. However, as cybercriminals expand the RaaS market to widen their earning potential, enterprises must also significantly step up their efforts to protect themselves,” said Gavin Chow, Fortinet’s Network and Security Strategist.

Organisations need to implement best cyber security practices to protect their networks against ransomware. Fortinet prescribes 10 steps which can be taken immediately:

  1. Patch and update your operating systems, devices and software.
  2. Back up your systems and store them offline, along with any device needed for network recovery.
  3. Run recovery drills and pre-assign responsibilities so systems can be restored quickly in the event of a successful breach.
  4. Update your email and web security gateways to check email attachments, websites, and files for malware.
  5. Use a sandbox to execute and analyse new or unrecognized files in a safe environment.
  6. Block advertisements and social media sites that have no business relevance.
  7. Use zero-trust network access that includes virus assessments.
  8. Use forensic analysis tools to identify where the infection came from and how long it has been in your environment.
  9. Segment your network into security zones to prevent the spread of infection.
  10. Inspect and block bring-your-own-devices that do not meet security policy.

 
“Bad actors often focus their attacks to achieve maximum impact and profitability by combining highly targeted attacks with increasingly stealthy and unexpected methods. Organizations that prepare now stand the greatest chance of withstanding this latest wave of malicious criminal activity,” concluded Chow.