Chapter 5. Protecting the Workforce

The majority of ransomware methods require some form of end-user interaction. Whether it is by the user going to a malicious website or clicking a link in a phishing email or even opening a compromised documents, this is primarily how hackers get in.

Therefore, we not only need to protect the data on our networks, but we must also focus on protecting our workforce—i.e., protecting your end users from themselves. You accomplish this using three main methods:

  1. Knowing the targets and their associated risks
  2. Learning how to prevent compromises through technology and vigilant operational processes
  3. Teaching and regularly testing your targets to ensure the lessons stick

These methods rely on not only you better understanding the overall environment you are protecting, but also the people involved. Not to mention really understanding your company’s business objectives. This not only helps you become a better defender of your workforce, but also aligns you more effectively with organizational goals. Ultimately that helps you not only do your job better, but prepares you for a more advanced position within your organization.

Knowing the Risks and Targets

Protecting against ransomware effectively requires that security teams start thinking differently. We can no longer think of our infrastructure and servers as the items to be exploited. We must realize that every employee of an organization that uses a computer, network device, tablet, or phone is a ...

Get Ransomware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.