{"id":5722,"date":"2016-07-05T20:31:12","date_gmt":"2016-07-05T20:31:12","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5722"},"modified":"2022-05-05T04:30:27","modified_gmt":"2022-05-05T08:30:27","slug":"fight-ransomware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/fight-ransomware\/5722\/","title":{"rendered":"Weaponry to fight ransomware"},"content":{"rendered":"<p>We\u2019ve already talked about the quick steps administrators can take in the event of an encrypting ransomware attack. Unfortunately, such incidents have been occurring more and more often.\u00a0Perhaps the most frustrating thing about this trend is that sometimes people expose their business to cyberthreats not because they can\u2019t afford security products, but because they don\u2019t know how to use the products to provide efficient protection from encrypting ransomware. In some cases, administrators fail to configure security solutions properly or even disable the required components.<\/p>\n<p>Kaspersky Lab has prepared several videos to help administrators configure the latest versions of <a href=\"https:\/\/www.kaspersky.com\/advert\/business-security\/small-to-medium-business?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> and <a href=\"https:\/\/www.kaspersky.com\/advert\/business-security\/windows-server-security?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Windows Server<\/a>. Both solutions include, among other features, technology capable of counteracting encrypting malware.<\/p>\n<p><strong>System monitoring<\/strong><\/p>\n<p>In most cases, security solutions block ransomware with no extra help, but new and recent malicious programs may not yet be included in their databases. To combat such threats, you need subsystems monitoring programs\u2019 behavior.\u00a0If the computers on your network are protected by <a href=\"https:\/\/www.kaspersky.ru\/business-security\/small-to-medium-business\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security for Business<\/a>, you can use the general control console in Kaspersky Security Center to enable updatable patterns of dangerous activity (Behavior Stream Signatures, or BSS) to identify and block malicious activity.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/V_PGnouFs44?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p><strong>Protection of sensitive documents<\/strong><\/p>\n<p>As we have said many times, maximum information security requires multilayered protection. As another layer of security, restricting access to files of a particular type is helpful, too.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/QWzDKBU0A6k?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>This feature allows you to deny all unknown programs\u2019 access to files of a selected type. For more information on setting this up, see our support site:<\/p>\n<p><a href=\"http:\/\/support.kaspersky.com\/10905\" target=\"_blank\" rel=\"noopener\">http:\/\/support.kaspersky.com\/10905<\/a><\/p>\n<p>Actually, there is one more weapon you might want to use in your fight against ransomware. Fans of extreme measures may also take advantage of Default Deny mode, which blocks any attempts to launch programs not included in the list of exceptions.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Weaponry to fight #ransomware<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fa9aV&amp;text=Weaponry+to+fight+%23ransomware\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Protection of shared resources<\/strong><\/p>\n<p>Protecting individual workstations is not sufficient, however. Data storage systems may be exposed to separate threats. After infiltrating one computer with access to folders on the server, ransomware can attack shared files. Potentially, it can spread throughout the network. That is why we included special protection from encryption in <a href=\"https:\/\/www.kaspersky.ru\/business-security\/windows-server-security\" target=\"_blank\" rel=\"noopener\">Kaspersky Security for Windows Server<\/a>.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/r8OV3x-L5Wo?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>The <strong>Anti-Cryptor<\/strong> task allows you to monitor shared resources and, if you detect questionable file activity in monitored folders, to block the machine involved. You can find step-by-step setup instructions on our support site: <u><a href=\"http:\/\/support.kaspersky.com\/12652\" target=\"_blank\" rel=\"noopener\">http:\/\/support.kaspersky.com\/12652<\/a><\/u><\/p>\n<p>But even using all available security technologies doesn\u2019t exempt you or your employees from the basic rules of computer hygiene. For those in need of a refresher, some highlights: Do not launch files attached to messages from unknown sources; do not follow links provided by someone you don\u2019t know; never download cracked software. These indiscreet actions\u2014and others in the same vein\u2014can be utterly ruinous to your company\u2019s finances.<\/p>\n<p>Finally, do not forget to update your security software and databases regularly. Following these recommendations will protect your company from ransomware and many other threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware attacks are on the rise, but we have tools to prevent them.<\/p>\n","protected":false},"author":2706,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2049,2441,192,420],"class_list":{"0":"post-5722","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-business","7":"category-smb","8":"tag-kaspersky-endpoint-security-for-business","9":"tag-kaspersky-security-for-windows-server","10":"tag-protection","11":"tag-ransomware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/fight-ransomware\/5722\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/fight-ransomware\/2029\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/fight-ransomware\/5722\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/fight-ransomware\/5722\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/kaspersky-endpoint-security-for-business\/","name":"Kaspersky Endpoint Security for Business"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5722"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5722\/revisions"}],"predecessor-version":[{"id":33710,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5722\/revisions\/33710"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}