6

Ransomware Countermeasures – Networking and Zero-Trust Access

As I mentioned in the first chapter, most ransomware attacks either start with a compromised device or a vulnerable service that is externally available, such as a VPN or VDI, which attackers then exploit.

Regardless, most of these attacks provide the attacker with a foot in the door and then give them a way to gain further access to the infrastructure.

Most of these attacks are prevented if the end user device does not have access to the infrastructure or the service is not externally available.

Therefore, in this chapter, using a zero-trust-based access model, we will go through the alternatives for how we can ensure that users and administrators can securely access services externally ...

Get Windows Ransomware Detection and Protection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.