article thumbnail

The Surge of Double Extortion Ransomware Attacks

Pen Test

CryptoLocker, in 2013, pioneered the use of strong encryption algorithms. Implement strong network segmentation, zero trust architecture, least privilege access controls, and VPNs to strictly limit lateral movement. Identify cyber insurance policies and ensure they align to business needs regarding ransomware attacks and data leaks.

article thumbnail

What is Ransomware? Everything You Should Know

eSecurity Planet

Notable Ransomware Attacks CryptoLocker ushered in the modern ransomware age in 2013, and in 2017, the devastating WannaCry and NotPetya ransomware attacks raised the threat’s profile significantly. If you have a cyber insurer , they will have their own processes for responding to any cyber attack.

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

The next three actions: prioritize assets and evaluate traffic, microsegmentation, and adaptive monitoring are central steps of the zero trust architecture and greatly reduce your risks of an attack. Moving toward zero trust offers visibility and control over your network, including stopping ransomware. Prioritize Assets and Evaluate Traffic.