img

Dormant ransomware is becoming more common, where attackers lurk on a target system for up to 18 months, conducting cyber-reconnaissance to determine when an organization is most vulnerable to attack. Attackers want to cause the most damage as possible to gain the most leverage for blackmail. Thus, attackers may know an organization’s systems better than they do, and attempt a series of attacks to disrupt an organization. Three steps an organization can take to discover dormant ransomware are having complete awareness of system infrastructure, automating alerts for abnormal behavior, and reducing attack surface.

Schedule a Cyber Health Checkup and take the initiative to launch these steps at your organization.