Latest News

  • Home /
  • Latest News

Mitigo - Are you resilient to a ransomware attack?

28 June 2022
David Fleming, Chief Technology Officer, Mitigo Cybersecurity

We’ve seen too many business owners having to endure it. The awful realisation that digital criminals are inside your firm, stealing and encrypting confidential personal and business information and using it to blackmail you.

You know for sure that your business is going to be severely damaged, and you’re going to have to explain yourself to the FCA, ICO and your clients.

To help you avoid this, here are our top 10 areas firms need to address to stop ransomware.
 
  1. Anti-Virus (AV) software.
AV is the software application that is designed to stop malicious software getting a foot hold on your devices and to prevent bad actors (hackers) taking control of your systems.

In the end-to-end journey of a successful ransomware attack, AV will have several opportunities to halt progress. Cyber criminals will attempt to switch it off as early in the journey as they can. Make sure it is centrally controlled, configured by a security specialist, kept up to date and on every device as a minimum.
 
  1. Email security filters.
Email platforms have filters that check incoming emails for malicious software, dodgy links and if they came from an untrusted origin.

One of the attackers’ favourite ways into a business is via an email. Setting your platform up correctly can make sure that employees are protected from this route in.
 
  1. Web browsing controls.
These controls are designed to stop or warn users they are about to visit a dangerous or fraudulent website.

To get around the AV software, fraudsters will often take unwitting staff to fraudulent websites. This risk can be minimised by correctly setting the controls in the browser, the AV and the operating system.
 
  1. Security patching.
Software providers like Microsoft or Google (Chrome) issue regular software updates that patch (fix) known vulnerabilities.

Cyber criminals will use bugs in software to compromise your defences and this is often used in ransomware attacks to get control. The simple discipline of updating these patches is probably the most neglected.
 
  1. Least privilege.
Every user on your system is assigned privileges that define what they can control, run, and amend.
 
Ransomware attackers take-over users’ accounts and the more privileges that a user has, the more damage the attacker can do. So an approach of least privilege should be followed.
 
  1. Remote authentication.
When working at a non-work location (e.g. at home) how do you tell business systems who you are and how do they authenticate that?

Username and password are no longer good enough protection for remote connection. Adding another method of authentication would stop a significant proportion of ransomware attacks.
 
  1. Test and scan externally facing assets.
Tests and scans of firewalls, domain addresses, login pages and IP addresses will check for vulnerabilities and gaps in your security defences.

You may not be scanning these, but the criminals are! So you need to find the open ports and poor configuration before they do.
 
  1. Review access management.
This relates to the documents, files, and folders that your system allows individuals to access.

There is a generic setting of “Everyone” in many systems. This means that everyone connected to the system can get to the documents, you do not even have to be authenticated. Access to documents should be defined by role.
 
  1. Alerting and incident response.
The controls and administration of your IT systems have alerts that warn you something is not right.

An incident response plan is a rehearsed set of steps that ensure businesses respond effectively to a cyber incident.

If you prepare these two things correctly you will have a chance of stopping a ransom attack in its tracks.
 
  1. Back-up.
This is the process by which your business takes a copy of the systems, applications, and documents for use in an emergency.

This is rarely configured correctly, which means that scarily few back-ups survive a ransomware attack, with everything ending up encrypted. Get yourself confident that yours would survive.
There is of course more to do, but if you do this top 10 well, it will dramatically reduce your risk. If you do not understand any of the above, please contact us.

Paradigm has partnered with Mitigo to offer cybersecurity risk management services to our members. Take a look at their full service offer here.

For more information contact Mitigo on 0161 8833 626 or email [email protected] 

 

19 December 2025

Pru - A Smarter Approach to Retirement Income


2 December 2025

Intelliflo- The new outsourcing: why advice firms are increasingly turning to technology


10 November 2025

Retirement Planning: Blending certainty with opportunity


5 November 2025

Blending Drawdown and Annuities: A Modern Approach to Retirement Planning


30 October 2025

Trick or treat? Dispelling the myths about AI in advice


24 September 2025

Simplify retirement advice with one solution


23 September 2025

What do F1 teams and advice firms have in common?


20 August 2025

Delivering peace of mind in an age of uncertainty


18 August 2025

The Prudential Guaranteed Income Plan


21 July 2025

intelliflo's 2025 advice efficiency survey


14 July 2025

The Prudential Guaranteed Income Plan


3 July 2025

Where does PruFund invest across the Globe?


23 June 2025

Pudential - New interactive PruFund client videos are live!


19 June 2025

intelliflo innovate 2025: welcome to tomorrow


19 May 2025

Four essential insights from intelliflo’s 2025 eAdviser index


7 May 2025

Prudential - Where PruFund invests in the UK


10 April 2025

Intelliflo - Bridging the gender advice gap


12 March 2025

intelliflo’s 2025 Advice Map of the UK


5 March 2025

Defaqto - BREAKING: New exclusive Member offers for Defaqto Engage


4 March 2025

Prudential - The growing appeal of insurance bonds, tax efficient strategies and the fast approaching TYE


3 March 2025

Paradigm Powerhouse: Celebrating Our Team's APCC Success!


17 February 2025

The future of advice tech: Five key trends for 2025


27 January 2025

What does 2025 hold for AI in financial advice?


13 January 2025

Happy New Tax Year End