How does ransomware get in, and how can business protect themselves?
Wouter: “There are lots of potential entry points, from email and brokers to active hacking via password stuffing. IoT devices are increasingly targeted as well, as they often share the same network with other company IT infrastructure.
“A successful cyberattack is almost never caused by one specific vulnerability or oversight, but by a cascade of things. It starts with a minor misconfiguration in a firewall, which then enables access to a printer that is, in turn, connected to another company server, which maybe has a weak admin password, etc.
“As IT professionals, we often think in silos, with each part of the infrastructure having its own team of specialists. This increases the chances of miscommunication between departments, which is a weakness hackers love to exploit. Protecting your business thus requires a holistic approach, with continuous, pro-active and automated monitoring to keep things manageable.”