My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
9.1 SR 07-20-2020
ElkRiver
>
City Government
>
City Council
>
Council Agenda Packets
>
2011 - 2020
>
2020
>
07-20-2020
>
9.1 SR 07-20-2020
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/23/2020 3:49:08 PM
Creation date
7/16/2020 9:42:17 AM
Metadata
Fields
Template:
City Government
type
SR
date
7/20/2020
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
24
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
4. Contact law enforcement immediately to report a ransomware event and request assistance. <br />Start with your local field office for the FBI to report this crime and ask for the Duty Agent. For <br />the Minneapolis FBI office call (763)569-8000. <br />5. Report a ransomware infection to the Federal Bureau of Investigation Internet Crime Complaint <br />Center (I3C): https://www.ic3.gov/default.aspx along with the following information: Date of <br />infection and victim company information, ransomware variant, how the infection occurred (i.e.. <br />link in email or browsing the internet), ransom and amount paid (if any), attacker’s Bitcoin <br />Wallet address and overall losses associated with the ransomware infection. <br />Preventative measures for a ransomware attack: <br /> Educate your personnel and implement an awareness training program. <br /> Enable strong spam filters to prevent phishing emails from reaching end users. <br /> Scan all incoming and outgoing emails to detect threats. <br /> Configure firewalls to block access to known malicious IP addresses. <br /> Patch operating systems <br /> Set anti-virus and anti-malware programs to conduct regular scans automatically. <br /> Manage the use of privileged accounts <br /> Configure access controls <br /> Disable macro scripts from office files transmitted via email. <br /> Implement software restriction policies <br /> Consider disabling Remote Desktop if it not being used. <br /> Use application whitelisting which only allows systems to execute programs known and <br />permitted by security policy. <br /> Execute operating systems environments or specific programs in a virtualized environment. <br /> Categorize data based on organizational value and implement physical and logical separation of <br />networks and data for different organizational units. <br /> Back up data regularly, verify the integrity of those backups and test the restoration process to <br />ensure it is working. <br /> Conduct an annual penetration test and vulnerability assessment. <br /> Secure your backups and ensure they are not connected permanently to the computers and <br />networks they are backing up. <br />Every business should contact their insurance company and verify if their current insurance binder has <br />coverage for Cyber Ransom. The Cyber Ransom coverage should be broken down into three different <br />categories: 1) Ransom Coverage 2) Business Loss 3) Restoration. <br /> <br /> <br />
The URL can be used to link to this page
Your browser does not support the video tag.