LATEST INTELLIGENCE
10 WAYS A ZERO TRUST ARCHITECTURE PROTECTS AGAINST RANSOMWARE
PRESENTED BY
rRansomware is the biggest threat to digital business
While ransomware has been around for decades , its prevalence has exploded in the last few years . These attacks used to be perpetrated by individuals ; now , they ’ re launched by networked groups of affiliates who buy and sell each other ’ s specialized skills and toolkits . Attacks were once unfocused and one-dimensional ; now , they use targeted , multilayered tactics that are much harder to defend against and command much higher ransoms . Ransomware is expected to cause $ 42 billion in damages by the end of 2024 .
Arguably , the most impactful trend in modern ransomware is the advent of double-extortion attacks , in which attackers steal data and threaten to publish it in addition to encrypting it . Roughly 50 % of ransomware
Download whitepaper here attacks now include attempts to exfiltrate data .
Architectures , access control policies , and monitoring and authentication tactics are put in place to mitigate the amount and severity of the damage an attacker can cause .
• 250 % increase in ransomware attacks over the past two years . Every organization is at risk , with escalating scope and volume .
• 1 in 2 ransomware infections involve data theft . Known as double extortion , this tactic forces victims to pay to protect data .
• An attack hits every 14 seconds worldwide . Attackers hide attacks to bypass traditional security controls .
Here are 10 ways in which zero trust can help your organization defend against ransomware :
Understanding the ransomware attack sequence
There is one underlying strategy that maximizes an organization ’ s chances at mitigating the damage a ransomware attack might cause : zero trust .
Zero trust is an approach to security that ’ s based on the notion that a breach has already occurred .
While ransomware groups leverage many different technologies , tactics , and payloads to achieve their aims , their attack sequence remains largely the same . 1 ) In general , attackers will first perform reconnaissance to discover weak entry points in the enterprise attack surface . Most often , this includes
22 INTELLIGENTCIO MIDDLE EAST www . intelligentcio . com