Ransomware gang, Conti, is demonstrating its growing political power, as Costa Rican President calls smaller nations to action.
How can one stop ransomware attacks in their tracks? The answer is combining identity-first principles with least-privilege data access security, all while leveraging a variety of cybersecurity best practices and technologies (i.e. email security, endpoint security, and patch management). An identity-first approach, that leverages proven identity security technologies such as public key infrastructure (PKI), helps to establish a strong foundation for overall security.
This is critical when mitigating threats as the verification of users (or entity such as non-humans – like machines, devices, software, or bots) vying for access are who they say they are and that anyone not meeting their parameters, such as anomalous behaviour, is instantly blocked and reported. Focusing on identity and access privileges drastically mitigates the damage that ransomware attacks can have on governmental institutions in the long run.
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics