Professional Documents
Culture Documents
Ransomware Galore:
The Four You Shouldn’t Ignore
Incident
Response Plan
The Four You Shouldn’t can trick people with real-looking (but fake) emails.
And those emails are laced with harmful links or
Ignore. attachments.
way to analyze and stop malware from running In Line with Cyber Best Practices More Beyond the Four
on those devices and hosts.
The Four Your Shouldn’t Ignore were not simply Don’t stop after you’ve made progress on the
That’s why you shouldn’t ignore malware pulled from thin air. They are in line with existing Four. Cisco Ransomware Defense goes a lot
protection for all of your endpoints. and well-regarded cybersecurity best practices further and provides:
like the Center for Internet Security (CIS)
Cisco AMP for Endpoints delivers essential Controls. For example: Network Segmentation. Logically separate the
malware protection for endpoints, and is the third things on your network that shouldn’t be actually
key technology in the layered Cisco Ransomware CIS Control 3: Secure Configurations for talking with one another.
Defense Solution. Hardware and Software on Mobile Devices,
Laptops, Workstations, and Servers. DNS-level Visibility and Enforcement. Know what’s on your
security provided by Cisco Umbrella is one of network and how they communicate for a clear,
Incident Response Plan consistent access policy.
many secure configurations that help harden the
You know the importance of system and minimize vulnerabilities.
business continuity and disaster
recovery planning, which is why CIS Control 7: Email and Web Protection. Cisco
you’ve already bolstered your data Email Security with AMP is a natural fit with this
backup program. It’s difficult and control.
time-consuming, but it’s necessary especially
CIS Control 8: Malware Defenses. Both Cisco
considering today’s growing ransomware threat.
AMP for Endpoints and Cisco Email Security with
Of course, you can’t begin restoring anything until AMP offer the critical malware defenses outlined
after you’ve resolved the cause. Do you know by this control.
what to do during critical moments after detecting
CIS Control 19: Incident Response and
an attack? How will you respond to quickly contain
Management. Cisco Incident Response Services
the damage? Without a solid response plan, a
can help you develop the comprehensive
ransomware outbreak will cause chaos.
set of people and process controls that CIS
That’s why you shouldn’t ignore the value of recommends. What we call an “Incident
incident response planning. Response Plan” is the really same detailed
incident response infrastructure discussed in this
Cisco Services Incident Response experts can Control. Plus our Incident Response experts can
help you develop that response plan, and also help you take the necessary corrective action
deal with active cyberattacks that are causing when you’re suffering from an active ransomware
damage now. We encourage our Incident outbreak or other cyberattack.
Response Services to complement the Cisco © 2018 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo
are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
Ransomware Defense Solution’s preventative and other countries. To view a list of Cisco trademarks, go to this URL: www.
cisco.com/go/trademarks. Third-party trademarks mentioned are the property of
technologies. their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)