Seven Myths That Could Compromise Your Ransomware Response

Wedge Networks would like to offer this Gartner report with our compliments!

There have been a number of large scale attacks leveraging the recently published NSA tools and exploits.  We have seen ransomware attacks such as WannaCry and Erebus hit a wide range of organizations around the world, using a Ransomware-as-a-Service platform that has been made available to a wide range of cybercriminals, regardless of their hacking skills.  New and advanced threats such as those being seen globally require a multi-layered defense strategy that can protect against multi-vectored threats.  In order to assist organizations with some useful information, Wedge Networks is pleased to offer the following report to our users to aid them in protecting themselves against these ransomware attacks.  

     

In the Gartner report, analyst Eric Ouellet, covers how "Increasing ransomware attacks pose a notable threat to business data and productivity".  "Security and risk management leaders can rely on best practices outlined here to protect their organizations from ransomware."

 

The report covers the following Key Challenges:

  • Many IT leaders have it wrong: Despite success, ransomware attacks are not sophisticated - they exploit traditional infection methods and are not stealthy.
  • Successful ransomware attacks primarily reveal the lack of adequate endpoint protection planning and strategy for every-sized organizations throughout every vertical.
  • Incomplete and misinformed use of endpoint protection and other best practices is a common cause of infection; no "silver bullet" approach only addresses ransomware.

Seven Myths That Could Compromise Your Ransomware Response, 2016 | Eric Ouellet | 08 November 2016

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

The Gartner Logo is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved.


Please provide the following information in order to access the Gartner Report (fields with "*" are mandatory). For further information, please feel free to contact Wedge Marketing at: marketing@wedgenetworks.com.

Note: In the "Promo Code" field, please put "Gartner Report" (case sensitive).  After submitting the form, you will be redirected to the Gartner Report.  If the Gartner Report did not load, or, if you would like to be contacted immediately to explore further interest, please email Wedge Marketing: marketing@wedgenetworks.com.