Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Prestige Ransomware Attack Highlights Need to Update Cyber Security

A NYC area cyber security consultant and managed services provider (MSP) examines recent ransomware attacks in a new article on the eMazzanti Technologies website. The informative article highlights the Russian Prestige attack as well as attacks on Nvidia, AirAsia and CommonSpirit Health.

The author then cites increasingly sophisticated methods, and a focus on healthcare and infrastructure, among other patterns that have emerged. He continues by urging best practices for credentials, including least privilege and zero trust policies. He concludes the article by encouraging the proper configuration of security tools.

“Recent ransomware attacks such as this Prestige attack serve as an indicator of ransomware trends and a reminder of the need for improved security,” stated Almi Dumi, CISO, eMazzanti Technologies.”

Recommended AI: Microsoft 365 Security Features Protect Business Data from Evolving Threats

Recent Ransomware Attacks Suggest Cybercrime Patterns

“Prestige – The Prestige attack mentioned above presents an example of a state-sponsored cyber-attack. In this case, Russia launched a targeted attack as an apparent warfare tactic focused on disrupting infrastructure. We have seen numerous such attacks around the world in recent years.”

“Nvidia – Early in 2022 a ransomware attack hit Nvidia, the world’s biggest semiconductor chip manufacturer. While Nvidia responded quickly to the attack, the event highlights the fact that even companies with strong security experience attacks.”

Credential Hygiene is Critical

Related Posts
1 of 33,444

“To guard against compromise of privileged accounts, organizations need to implement several best practices for credentials. For instance, the principle of least privilege mandates that users should be granted the minimum amount of access necessary. Tools like Microsoft Entra provide the analytics necessary to ensure that users do not have excessive or unused permissions.”

Recommended AI: Consider Your DOOH Buying Methods Wisely: Direct Sales vs. Programmatic Buying

Configure Security Tools Properly

“Microsoft offers a suite of security tools in the Microsoft Defender family of products. Even small businesses can take advantage of enterprise-grade endpoint protection by deploying Microsoft Defender for Business. These tools and others can play a critical role in reducing the risk of ransomware and other cyber-attacks.”

Cyber Security Investment Delivers Results

Improving an organization’s cyber security posture requires an investment. However, companies that invest the time and resources required see important returns in mitigating the risk of a successful attack.

The cyber security consultants at eMazzanti Technologies offer the expertise necessary to ensure that business leaders deploy the security resources they need. They help to choose and configure security tools, including access management, email protection, data encryption and continuous network monitoring.

Recommended AI: Understanding the Role of AI in Gaming

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.