Wednesday, November 6, 2019

Word of the Day: ransomware as a service

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | November 6, 2019
ransomware as a service

Ransomware as a service (RaaS) is a low-code software delivery model for malicious software. In this delivery model, programmers who develop software for carrying out ransomware attacks make the software available, sometimes for purchase, on the dark net. 

RaaS provides criminals with a minimal learning curve for carrying out extortion attacks. The software is designed to be user-friendly and typically provides the user with a graphical user interface (GUI) that looks very much like traditional e-commerce dashboards. An RaaS dashboard will typically feature drag-and-drop modules to help the criminal customize payloads, as well as metrics for monitoring infections and the current price of bitcoin.

 

The software as a service (SaaS) delivery model has proved to be beneficial to the criminal because it allows them to lower their own risk profile. With RaaS, they now have a choice to either become a silent partner in an extortion attempt or remove themselves entirely and simply monetize their programming skills.

 

The recent uptick in the number of ransomware infections has been attributed by many security experts to the advent of RaaS and affiliate networks of RaaS customers. To prevent yourself from becoming a victim of an RaaS attack, security experts recommend the following:

  • Backup all data on a regular basis to minimize the attack surface.
  • Apply software updates as soon as they become available.
  • Maintain a "security first" mentality.
  • Consider investing in cybersecurity insurance.

Quote of the Day

 

"It's important to remember the ransomware model is particularly well-suited to target enterprises; for many enterprises, it's worth paying the ransom rather than losing their vital corporate data." - Nick Lewis

Learning Center

 

Ransomware attacks on hospitals will worsen if security doesn't improve
Ransomware attacks are insidious. Experts urged healthcare CIOs to invest in proactive security measures to combat the growing threat.

Ransomware attacks: How to get the upper hand
Ransomware attacks are on the rise. Can organizations play like Radiohead and refuse to pay? The answer from security experts is a qualified yes.

Protect backup from ransomware attacks and recover safely
Ransomware continues to get smarter and more sinister. Make sure you protect backups from ransomware that delays detonation and gets recovered into production.

Who's to blame for ransomware attacks -- beyond the attackers?
Cyberattackers are to blame for ransomware attacks, but what about companies that release flawed software or don't install patches? Our expert looks at where the buck stops.

 

Ransomware attack recovery pointers for when you've been hit
Ransomware recovery is a complex and expensive process, and an attack can happen to anyone. Taking precautions and acting early could save your data -- and a good amount of money.

Quiz Yourself

 
Can you recover from ransomware? Take our quiz and find out
Ransomware recovery is a complex, often expensive process. Are you prepared in the event of an attack? It may be time to ask yourself the difficult (or perhaps easy) questions.
.

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: