{"id":3376,"date":"2021-12-08T15:31:00","date_gmt":"2021-12-08T20:31:00","guid":{"rendered":"https:\/\/prolifics.com\/us\/?p=3376"},"modified":"2025-09-17T21:03:52","modified_gmt":"2025-09-17T15:33:52","slug":"yes-ransomware-is-still-a-thing","status":"publish","type":"post","link":"https:\/\/prolifics.com\/usa\/resource-center\/blog\/yes-ransomware-is-still-a-thing","title":{"rendered":"Yes &#8211; Ransomware is Still a Thing"},"content":{"rendered":"<h2>Protect Your Company<\/h2>\n<p>News report: \u201cUniversal Health Services, one of the largest healthcare providers in the U.S., has been hit by a <a href=\"https:\/\/techcrunch.com\/2020\/09\/28\/universal-health-services-ransomware\/\" target=\"_blank\" rel=\"noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">ransomware attack<\/span><\/a>.\u201d In a ransomware attack, the bad guys probe for vulnerabilities in the target\u2019s computer system. Once in, they enter code that encrypts files, rendering them inaccessible. The hackers will send a decryption key only after the victim pays the demanded ransom.<\/p>\n<h4><strong>Plan to be a SOAR winner against ransomware<\/strong><\/h4>\n<p>Ransomware attacks (malware) are happening more frequently than ever before. Every company needs to have a security framework that includes a Security Orchestration, Automation and Response (SOAR) plan to address ransomware attacks. SOAR solutions streamline security operations in three main areas:<\/p>\n<h4><strong>1) Threat and Vulnerability (Orchestration)<\/strong><\/h4>\n<p>You need to detect and prevent the security vectors (the pathways into your system used by hackers) that allow ransomware to be installed and run in your company\u2019s network. Threat detection\/analysis solutions are constantly updated with the latest security vectors from around the world. These solutions analyze and detect security threats and prevent your environment from being compromised. Detecting, analyzing and removing the latest ransomware\/malware versions is a critical first line of threat and vulnerability defense.<\/p>\n<h4><strong>2) Incident Response<\/strong><\/h4>\n<p>Okay, you tried your best to detect and prevent all the security vectors from entering your computing environment, but there was that one person who received an email and clicked an attachment or hyperlink. That one click started the download and installation of the ransomware on a computer and its replication to other servers and applications.&nbsp;<\/p>\n<ul>\n<li>Having an Incident Response (IR) plan to address this type of event is critical to stopping and recovering from a malware incident. The Incident Response needs to have easy to follow steps on how to stop and uninstall ransomware from running and propagating within your network.<\/li>\n<li>If Personal Identifiable Information (PII) was compromised, then the <a href=\"https:\/\/prolifics.com\/usa\/resource-center\/specialty-guides\/data-privacy\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">General Data Protection Regulation (GDPR) and\/or California Consumer Privacy Act (CCPA)<\/span><\/a> may require you to notify the impacted end users within a set timeframe. The Incident Response playbook should detail how to notify those end users whose personal data may have been compromised.<\/li>\n<\/ul>\n<h4><strong>3) Operations automation<\/strong><\/h4>\n<p>Streamlining or automating security practices frees up engineering time that would otherwise be used scanning, patching and resolving security incidences. <a href=\"https:\/\/prolifics.com\/usa\/resource-center\/blog\/what-robot-do-you-need\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">Automation<\/span><\/a>:<\/p>\n<ul>\n<li>Removes potential human errors (such as typos, wrong admin commands or admin rights to a wrong account) made during regular operational tasks.<\/li>\n<li>Increases operational security by consistently performing manual tasks, removing potential human errors from happening.<\/li>\n<li>Provides standard procedures for Incident Response activities and tasks.<\/li>\n<li>Deploys Identity and Access Management (IdM) solutions to secure and manage user Identity life cycle (identity and access recertification, password management), and access management (SSO, 2FA, PAM) across the enterprise.<\/li>\n<\/ul>\n<p>Make SOAR part of your security framework and help ensure that your company will stay out of the latest news reports on hackers and ransomware.<\/p>\n<h4><strong>Talk with us<\/strong><\/h4>\n<p>You have a vision for your organization \u2013 don\u2019t let your technology slow you down. Prolifics Security helps you architect and implement SOAR solutions by discussing and prioritizing security requirements, as part of an overall security framework. Talk with us \u2013 let\u2019s discuss your challenges, review and reevaluate your plans and get you started where it makes the most sense. <strong><em>Vision to Value. Faster.<\/em><\/strong> It\u2019s not just our tagline, it\u2019s what drives us. It\u2019s how we deliver solutions and services. It\u2019s our commitment to you \u2013 and it\u2019s needed today more than ever. Visit&nbsp;<a href=\"https:\/\/www.prolifics.com\/\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">www.prolifics.com<\/span><\/a>&nbsp;or email<span class=\"has-inline-color has-vivid-cyan-blue-color\">&nbsp;<a href=\"mailto:solutions@prolifics.com\">solutions@prolifics.com<\/a>.<\/span><\/p>\n<p><strong>About the author<\/strong><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-large is-resized\"><img decoding=\"async\" data-src=\"https:\/\/prolifics.com\/usa\/wp-content\/uploads\/2020\/10\/rob-adachi.png\" alt=\"\" class=\"wp-image-3381 lazyload\" width=\"149\" height=\"149\" title=\"\" data-srcset=\"https:\/\/prolifics.com\/usa\/wp-content\/uploads\/2020\/10\/rob-adachi.png 450w, https:\/\/prolifics.com\/usa\/wp-content\/uploads\/2020\/10\/rob-adachi-300x300.png 300w, https:\/\/prolifics.com\/usa\/wp-content\/uploads\/2020\/10\/rob-adachi-150x150.png 150w\" data-sizes=\"auto\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 149px; --smush-placeholder-aspect-ratio: 149\/149;\" data-original-sizes=\"(max-width: 149px) 100vw, 149px\" \/><\/figure>\n<\/div>\n<p>Rob Adachi is Head of Security &#8211; Identity and Access for Prolifics and also leads a team of engineers implementing Tivoli security solutions for Fortune 500 companies. He has more than 20 years in the Identity Management field, starting with the early software development of the product that is now known as Tivoli Identity Manager (ITIM). Learn more about Rob <a href=\"https:\/\/www.linkedin.com\/in\/robert-adachi-5652791\/\" target=\"_blank\" rel=\"noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">here<\/span><\/a> and reach him at <a href=\"mailto:Robert.Adachi@prolifics.com\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">Robert.Adachi@prolifics.com<\/span><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protect Your Company News report: \u201cUniversal Health Services, one of the largest healthcare providers in the U.S., has been hit by a ransomware attack.\u201d In a ransomware attack, the bad [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":29592,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[49],"tags":[],"class_list":["post-3376","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"acf":[],"builder_content":"","_links":{"self":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts\/3376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/comments?post=3376"}],"version-history":[{"count":0,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/posts\/3376\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/media\/29592"}],"wp:attachment":[{"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/media?parent=3376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/categories?post=3376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prolifics.com\/usa\/wp-json\/wp\/v2\/tags?post=3376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}