ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Response to Growing Cryptoware Threat

    IT Discussion
    email cryptoware ransomware malware security
    2
    7
    2.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender
      last edited by scottalanmiller

      So, when do we disable or go to pure white list email to combat these emails?

      Change our business cards to include only our phone number and possibly our IT departments contact for other types of access, like email so your IT department can add them and their IP to the white list... Of course this kills the little guy who uses free services like google or outlook.com, etc.

      1 Reply Last reply Reply Quote 2
      • scottalanmillerS
        scottalanmiller
        last edited by

        Instead of whitelisting, why not block attachments and automatic link detection? Those are the only real vectors, right? Isn't it only the attempt to use email as more than it was designed for (primarily as a file server) that is the root of these issues?

        Lots of businesses do actually whitelist and it is incredibly annoying for them and for their business partners and is not very effective. But removing the ability to infect through email is pretty trivial.

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller
          last edited by

          You could implement a human validation system. I know companies that have done this. Any remotely suspect email that passes spam and malware filters goes to a human to vet. That human is not emotionally tied to the email (can't be swayed by a fake job offer or a fake contest or Nigerian prince scam) and can be very trained and selected based on their ability to reasonably filter email.

          Expensive but.... Safe and effective.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller
            last edited by

            Another question that I have (and I will make a thread around this when I return from picking up dinner for the family) is why do so many companies have file share level exposures? The effectiveness of these attacks are directly dependent on a form of access that, I feel, is rarely appropriate of needed beyond access to a single, local machine.

            DashrenderD 1 Reply Last reply Reply Quote 0
            • DashrenderD
              Dashrender @scottalanmiller
              last edited by

              @scottalanmiller said:

              Another question that I have (and I will make a thread around this when I return from picking up dinner for the family) is why do so many companies have file share level exposures? The effectiveness of these attacks are directly dependent on a form of access that, I feel, is rarely appropriate of needed beyond access to a single, local machine.

              Exposure how, to the internet?

              scottalanmillerS 1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @Dashrender
                last edited by

                @Dashrender said:

                @scottalanmiller said:

                Another question that I have (and I will make a thread around this when I return from picking up dinner for the family) is why do so many companies have file share level exposures? The effectiveness of these attacks are directly dependent on a form of access that, I feel, is rarely appropriate of needed beyond access to a single, local machine.

                Exposure how, to the internet?

                Exposure to files via protocols like SMB. Why the need for file protocol exposure?

                1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller
                  last edited by

                  http://mangolassi.it/topic/6748/do-we-still-need-file-protocols-today

                  1 Reply Last reply Reply Quote 1
                  • 1 / 1
                  • First post
                    Last post