F5 Labs Cybersecurity Guidance: Ransomware Defenses
The F5 Labs 2021 Application Protection Report notes that ransomware was a factor in roughly 30 percent of U.S. breaches in 2020. In the breach analyses, we found that user account management, network segmentation, and data backup were some of the most important controls to consider.
Implementing these controls can be difficult, so this article goes into more detail on things you can do to defend your environments against ransomware breaches.
Check out Cybersecurity Controls to Stop Ransomware from F5 Labs (6 min read).
Published Aug 10, 2021
Version 1.0Ray_Pompon
Raymond Pompon is currently the Director of F5 labs. With over 20 years of experience in Internet security, he has worked closely with Federal law enforcement in cyber‐crime investigations. He was been directly involved in several major intrusion cases including the FBI undercover Flyhook operation and the NW Hospital botnet prosecution. For six years, Raymond was president and founder of the Seattle chapter of InfraGard, the FBI public-private partnership. He is on the board of advisors for three information assurance certificate programs at the University of Washington. He is also on the board of the Delaware Chapters of InfraGard and ISC2. He is the author of IT Security Risk Control Management: An Audit Preparation Plan from Apress books. He is a Certified Information Systems Security Professional.Ret. Employee
Ray_Pompon
Raymond Pompon is currently the Director of F5 labs. With over 20 years of experience in Internet security, he has worked closely with Federal law enforcement in cyber‐crime investigations. He was been directly involved in several major intrusion cases including the FBI undercover Flyhook operation and the NW Hospital botnet prosecution. For six years, Raymond was president and founder of the Seattle chapter of InfraGard, the FBI public-private partnership. He is on the board of advisors for three information assurance certificate programs at the University of Washington. He is also on the board of the Delaware Chapters of InfraGard and ISC2. He is the author of IT Security Risk Control Management: An Audit Preparation Plan from Apress books. He is a Certified Information Systems Security Professional.Ret. Employee
No CommentsBe the first to comment