<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">


Is your data safe from Ransomware? 4 ways to find out.

Posted by Lauren Hanlon on Apr 11, 2017 8:29:00 AM

Now that you have read and implemented our 4 step guide to stopping ransomware, you probably want to test to see just how vulnerable your system is. Here are our top four ways to confirm that you and your data are as safe as possiblehacked-2127635__340.png

  • Phishing Tests
  • Vulnerability Scans
  • Penetration Tests
  • Network Assessment


Phishing Tests:

We told you that hackers are recruiting your employees and often send phishing emails as a way to gain access to your system.  These emails trick the end user into giving away sensitive information that is then used to hack your network. What we haven’t told you until now is you can (and should!) do regular phishing tests yourself.  Meaning you send emails that resemble a real phishing email as a way to test your teams savviness. You, or your IT professional, can determine how often the test email goes out, what they look like, and ensure too many people don’t receive at once. Once the test is complete, you receive a list that identifies who clicked on the link and when.


Vulnerability scans:

Vulnerability scans are a great way to test for weaknesses in your network. This technique simply cans your network and reports on areas where your security measures fall short.


Penetration Tests:

Penetration Tests, also called ‘pen tests’, describe a situation in which you actively try to hack your network as a way of discovering your systems weaknesses. It is important that these tests are done by neutral third party firms, not the firm or employee who oversees your network.


Network Assessment:

Similar to a vulnerability scan, a network assessment helps to spot weakness in your network. Unlike a vulnerability scan, a network assessment involves an onsite walk through and evaluation of your infrastructure. A complete network assessment should end with a discussion of pain points in addition to providing short and long term recommendations.



 Check out our blog  to learn more about why ransomware attacks are on the rise 


Visit our Cyber Security page for more information. 

Related Articles: 

Cybercriminals are Recruiting Your Employees

Facebook has a new tool for security, but is it wise?

Cyber Security Error at a New York airport

Another Day Another Breach: Uber, Fitbit, OKCupid


Topics: Cyber Security