• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

IIJ Global Solutions Singapore, Providing Cloud and Security Solutions

  • Home
  • Products
    • Zero Trust
    • Email Security
    • Email Phishing Training
    • Cloud Backup
    • Vulnerability Management
    • Endpoint Management
    • Log Management
    • IoT Remote Maintenance
    • Firewall Management
    • Secure Remote Desktop
  • Solutions
    • DX Edge Data Center
    • Logs Management Solution
    • Telework Solutions
    • System Integration
    • Cloud Services
    • Office IT Solutions
    • Retail IT Solutions
  • Blog
  • Materials
  • About Us
  • Careers
  • Contact Us
  • Site Map
  • 日本語ページ
    • 会社概要
    • ソリューション
You are here: Home / Blog / Acronis / 5 crucial measures to protect from Ransomware

02/02/2022 By iij-sgp-mrk

5 crucial measures to protect from Ransomware

Ransome-Fev2022-ec

Heavy Campaign of Ransomware in Singapore

According to SINGAPORE CYBER LANSCAPE 2020, In 2020, 89 ransomware cases were reported to CSA, with cases hailing from the manufacturing, retail and healthcare sectors. This was a significant rise of
154% in cases over the whole of 2019.

 

5 standard and important measures against Ransomware

Here are the 5 crucial measures against Ransomware from the IT professional’s point of view.

 

1) Enhance Email Security

Over 90% malware comes from emails.
To be protected by Multi-venders’ Anti-malware/Anti-Spam are effective.
To filter emails by Sender authentication(SPF/DKIM/DMARC) are necessary against fishing emails.
And, to remove Macro from files are best way against “Emotet”.


SecureMX-SenderAuthenticationIIJ SecureMX Sender Authentication Filter setting

 

2) Implement proper Anti-malware solutions and monitor them

To implement proper Anti-malware solutions not only to FW(UTM), but to PC, Servers is crucial.
Centralized management is effective, You can check all the devices’ status at a glance.

Trendmicro-Anti-Ransomware-2TrendMicro WorryFree Service Anti-Ransomware setting 

 

3) Update Security Patches of your IT Equipment

It is essential to inspect and respond to security vulnerabilities.
A lot of staff members are working from home in the Covid19 situation and using home network to access your important data. Endpoint management is a crucial measure against malware.

LanScope-Patch-managementLanScope  Vulnerability Management Console

 

4) Monitor logs and behavior

It is useful to monitor a large number of files renaming and logon failures. This is a common behavior of Ransomware. 
To get alerts timely, you can take measures against the incidents immediately.

ALog-Files-RenamingALog Reporting for Files Renaming

 

5) Back up your data properly

No one can guarantee 100% that you will not get infected. Multiple backup, including off-site backup is an effective way.

Acronis-ConsoleAcronis Cloud Backup Console

Filed Under: Acronis, ALog, Blog, LanScope, Ransomware, SecureMX, Security, Telework Tagged With: Acronis, ALog, LanScope, SecureMX, Security

Feel free to contact us!

https://ap.iij.com/contact/

Primary Sidebar

Recent Posts

  • New Mail Audit option for IIJ SecureMX Service has been released
  • <ゼロトラストを活用した海外現地法人セキュリティ改善ウェビナー>
  • We have moved! (February 2022)
  • 5 crucial measures to protect from Ransomware
  • IIJ Launches New Managed ZTNA Secure Access Service; Safous

Categories

  • Acronis
  • ALog
  • Blog
  • Company
  • LanScope
  • Ransomware
  • Safous
  • SecureMX
  • Security
  • Telework
  • ZeroTrust

Tags

Acronis ALog BEC LanScope SecureMX Security Telework Zerotrust

Archives

  • August 2022
  • May 2022
  • February 2022
  • October 2021
  • September 2021
  • December 2020
  • November 2020
  • October 2020

Footer

Company Profile

IIJ Global Solutions Singapore Pte. Ltd.

Tel : +65-6773-6903

Location : 8 Burn Road #07-08 Trivex Singapore 369977

follow us in feedly

Recent Posts

  • New Mail Audit option for IIJ SecureMX Service has been released
  • <ゼロトラストを活用した海外現地法人セキュリティ改善ウェビナー>
  • We have moved! (February 2022)
  • 5 crucial measures to protect from Ransomware
  • IIJ Launches New Managed ZTNA Secure Access Service; Safous
  • We have launched a Special Website of our Log Management Solution
  • 3 measures to prevent Business E-mail Compromise(BEC) attacks
  • How to maintain the security level of your devices in the telework situation?

Search

Privacy Policy/Terms of Use

Privacy Policy

Terms of Use

Home

IIJ_Singapore_header
© IIJ Global Solutions Singapore Pte. Ltd. All rights reserved.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT