Comments: No Comments
Albert E. Whale, CEH CHS CISA CISSP BSEE
May 9, 2021
Ransomware is costing Millions of dollars per day. Maybe you think that I’m exaggerating, I’m not. The cost in the Healthcare industry alone in 2020 was over $21 Billion, that’s only in Healthcare. What happens to your business after the Ransomware breach? Your costs go up, people lose their jobs, and your clients seek other businesses to deal with, right?
You’ve probably seen Disaster Girl before, haven’t you?
IT Security Solutions has reported issues with many different Routers, Wireless Access Points, and other devices inside the networks. This is the big problem because traditional tools are unable to discover the Built in Malware, the Configurations deployed, or any number of other factors.
What are you doing to protect your business environment? If your plan is the Legacy Firewall or Virus Scanners on the end points, then you are only looking for tomorrow’s attack.
What happened yesterday? Did you or your staff report issues inside the environment which may be the start to Ransomware? I’m guessing, probably not. Please don’t expect the SIEM that you invested in to identify the security issues either. These devices are typically programmed from internal teams, and they don’t have 100% coverage on the logfiles they are reviewing.
At best, they can tell you about the activities which already occurred, they stopped nothing. Is that the plan? Review the logs to determine what could have happened? In the meantime, the average breach costs approximately $4 Million dollars, takes MONTHS to identify and 6 to 18 months to fix. Can your business hold its breath for that long? Can our Country hold its breath?
Recently the Colonial Pipeline breach force the shutdown of country’s Oil, Gas & Diesel distribution network.
I’ll bet you thought that your backups would protect your business.
Hot Backups are not the answer. If they were, Ransomware would not be as effective as it already is. These issues outline serious cybersecurity matters in our businesses and our National Critical Infrastructure. If we continue to the same thing over and over again, we will continue to have the same results.
If your business hasn’t changed the strategy for your organization, we can help. Today can be the first day, for your organization’s stability. Let us have a conversation together and develop the strategy that will work for you.
IT Security Solutions recommends at least an annual Security assessment to determine the security posture and formal detection of internal activities. While this is the minimum recommendation, even doing the Minimum does not detect the activities as well as out continuous monitoring solutions for our clients.
IT Security Solutions, Inc. is a Pittsburgh based technology company with 25+ years of cyber security domain expertise catering to businesses of all sizes. The solutions offered range from technology security audits and penetration testing to continuous network scanning. The company recently launched ITS Safe™, a proprietary managed security solution that blocks hackers from attacking networks – the largest IT security threat facing businesses today.
Contact IT Security Solutions to discuss how a paradigm shift will benefit your company today.