<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://205.166.159.208/wiki/index.php?action=history&amp;feed=atom&amp;title=Preventing_and_Mitigating_Ransomware</id>
	<title>Preventing and Mitigating Ransomware - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://205.166.159.208/wiki/index.php?action=history&amp;feed=atom&amp;title=Preventing_and_Mitigating_Ransomware"/>
	<link rel="alternate" type="text/html" href="http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;action=history"/>
	<updated>2026-04-07T15:52:55Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.5</generator>
	<entry>
		<id>http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19848&amp;oldid=prev</id>
		<title>Skychemist5 at 20:47, 17 June 2022</title>
		<link rel="alternate" type="text/html" href="http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19848&amp;oldid=prev"/>
		<updated>2022-06-17T20:47:06Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 20:47, 17 June 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l13&quot; &gt;Line 13:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The all too often adage is &amp;quot;failing to plan, is planning to fail&amp;quot; is in play.  It is equally true that a half hearted effort equally has the potential to end in ruin.  Cyber security involves prevention and response.  Countermeasures towards malicious activates include:  1) Identifying and classifying the assets within infrastructure, to know the critical and non critical devices, core services and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible vs when necessary.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, system design, good computer habits and a cyber hygiene program with a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;and/or replace &lt;/del&gt;the role of a CISO in many instances and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;should be &lt;/del&gt;apart of their responsibilities given the magnitude IT security impacts all organizations.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The all too often adage is &amp;quot;failing to plan, is planning to fail&amp;quot; is in play.  It is equally true that a half hearted effort equally has the potential to end in ruin.  Cyber security involves prevention and response.  Countermeasures towards malicious activates include:  1) Identifying and classifying the assets within infrastructure, to know the critical and non critical devices, core services and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible vs when necessary.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, system design, good computer habits and a cyber hygiene program with a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement the role of a CISO in many instances &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;with security audits &lt;/ins&gt;and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;monitoring as a &lt;/ins&gt;apart of their responsibilities &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;- &lt;/ins&gt;given the magnitude IT security impacts all organizations.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Skychemist5</name></author>
	</entry>
	<entry>
		<id>http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19837&amp;oldid=prev</id>
		<title>Skychemist5 at 16:40, 17 June 2022</title>
		<link rel="alternate" type="text/html" href="http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19837&amp;oldid=prev"/>
		<updated>2022-06-17T16:40:46Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 16:40, 17 June 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l8&quot; &gt;Line 8:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;These attacks are not limited to poorer countries, both [https://technical.ly/civic-news/baltimore-cyberattacks-timeline/ Baltimore] and the [https://www.securitymagazine.com/articles/96901-maryland-dept-of-health-confirms-ransomware-attack state of Maryland] &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;has &lt;/del&gt;been &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;repeated &lt;/del&gt;compromised by ransomware.  Colleges and universities are under increasing threat, include not only the [https://www.govtech.com/education/cyberattack-university-of-maryland.html ransoming of data, but the exposure of personal information] when institutions refuse to pay.  Recently [https://www.bleepingcomputer.com/news/security/lincoln-college-to-close-after-157-years-due-ransomware-attack/ Lincoln College] attributed its closing due to the effects of ransomware.  Whole public infrastructures have been held ransom  &lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;These attacks are not limited to poorer countries, both [https://technical.ly/civic-news/baltimore-cyberattacks-timeline/ Baltimore] and the [https://www.securitymagazine.com/articles/96901-maryland-dept-of-health-confirms-ransomware-attack state of Maryland] &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;have &lt;/ins&gt;been &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;repeatedly &lt;/ins&gt;compromised by ransomware &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;attackers&lt;/ins&gt;.  Colleges and universities are under increasing threat, include not only the [https://www.govtech.com/education/cyberattack-university-of-maryland.html ransoming of data, but the exposure of personal information] when institutions refuse to pay.  Recently [https://www.bleepingcomputer.com/news/security/lincoln-college-to-close-after-157-years-due-ransomware-attack/ Lincoln College] attributed its closing due to the effects of ransomware.  Whole public infrastructures have been held ransom  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IT infrastructures are further potentially compromised with software flaws and exploits, such as [https://www.darkreading.com/vulnerabilities-threats/office-365-files-stored-in-the-cloud-vulnerable-to-ransomware-encryption Microsoft Exchange, Microsoft 365, SharePoint, OneDrive and Teams] which permit attackers to compromise entire networks.  In addition to indirect and random infections, directed attacks have the potential for further disruption.  Purposeful attacks and compromises come from learning a potential victims unique vulnerabilities and network topology.  Too often IT professions rely on such measures as the Common Vulnerability Scoring System (CVSS) and other rating systems without realizing cybercriminals use these low scoring vulnerabilities as means of compromise.  Such instances demand vigilance and staying current on the part of IT professionals and end-users alike.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IT infrastructures are further potentially compromised with software flaws and exploits, such as [https://www.darkreading.com/vulnerabilities-threats/office-365-files-stored-in-the-cloud-vulnerable-to-ransomware-encryption Microsoft Exchange, Microsoft 365, SharePoint, OneDrive and Teams] which permit attackers to compromise entire networks.  In addition to indirect and random infections, directed attacks have the potential for further disruption.  Purposeful attacks and compromises come from learning a potential victims unique vulnerabilities and network topology.  Too often IT professions rely on such measures as the Common Vulnerability Scoring System (CVSS) and other rating systems without realizing cybercriminals use these low scoring vulnerabilities as means of compromise.  Such instances demand vigilance and staying current on the part of IT professionals and end-users alike.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Skychemist5</name></author>
	</entry>
	<entry>
		<id>http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19836&amp;oldid=prev</id>
		<title>Skychemist5 at 16:39, 17 June 2022</title>
		<link rel="alternate" type="text/html" href="http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19836&amp;oldid=prev"/>
		<updated>2022-06-17T16:39:21Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 16:39, 17 June 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l13&quot; &gt;Line 13:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The all too often adage is &amp;quot;failing to plan, is planning to fail&amp;quot; is in play.  It is equally true that a half hearted effort equally has the potential to end in ruin.  Cyber security involves prevention and response.  Countermeasures towards malicious activates include:  1) Identifying and classifying the assets within infrastructure, to know the critical and non critical devices, core services and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible vs when necessary.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, system design, good computer habits and a cyber hygiene program with a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement and/or replace the role of a CISO in many instances.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The all too often adage is &amp;quot;failing to plan, is planning to fail&amp;quot; is in play.  It is equally true that a half hearted effort equally has the potential to end in ruin.  Cyber security involves prevention and response.  Countermeasures towards malicious activates include:  1) Identifying and classifying the assets within infrastructure, to know the critical and non critical devices, core services and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible vs when necessary.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, system design, good computer habits and a cyber hygiene program with a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement and/or replace the role of a CISO in many instances &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;and should be apart of their responsibilities given the magnitude IT security impacts all organizations&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Skychemist5</name></author>
	</entry>
	<entry>
		<id>http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19835&amp;oldid=prev</id>
		<title>Skychemist5 at 16:36, 17 June 2022</title>
		<link rel="alternate" type="text/html" href="http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19835&amp;oldid=prev"/>
		<updated>2022-06-17T16:36:47Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 16:36, 17 June 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l13&quot; &gt;Line 13:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The all too often adage is &amp;quot;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Failing &lt;/del&gt;to plan, is planning to fail&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;.&lt;/del&gt;&amp;quot; is in play.  It is equally true that a half hearted effort equally has the potential to end in ruin.  Cyber security involves prevention and response.  Countermeasures towards malicious activates include:  1) Identifying and classifying the assets within infrastructure, to know the critical and non critical devices, core services and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible vs when necessary.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, system design, good computer habits and a cyber hygiene program with a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement and/or replace the role of a CISO in many instances.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The all too often adage is &amp;quot;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;failing &lt;/ins&gt;to plan, is planning to fail&amp;quot; is in play.  It is equally true that a half hearted effort equally has the potential to end in ruin.  Cyber security involves prevention and response.  Countermeasures towards malicious activates include:  1) Identifying and classifying the assets within infrastructure, to know the critical and non critical devices, core services and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible vs when necessary.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, system design, good computer habits and a cyber hygiene program with a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement and/or replace the role of a CISO in many instances.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Skychemist5</name></author>
	</entry>
	<entry>
		<id>http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19834&amp;oldid=prev</id>
		<title>Skychemist5 at 16:35, 17 June 2022</title>
		<link rel="alternate" type="text/html" href="http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19834&amp;oldid=prev"/>
		<updated>2022-06-17T16:35:04Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 16:35, 17 June 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l8&quot; &gt;Line 8:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;These attacks are not limited to poorer countries, both [https://technical.ly/civic-news/baltimore-cyberattacks-timeline/ Baltimore] and the [https://www.securitymagazine.com/articles/96901-maryland-dept-of-health-confirms-ransomware-attack state of Maryland] has been repeated compromised by ransomware. Recently [https://www.bleepingcomputer.com/news/security/lincoln-college-to-close-after-157-years-due-ransomware-attack/ Lincoln College] attributed its closing due to the effects of ransomware.  Whole public infrastructures have been held ransom  &lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;These attacks are not limited to poorer countries, both [https://technical.ly/civic-news/baltimore-cyberattacks-timeline/ Baltimore] and the [https://www.securitymagazine.com/articles/96901-maryland-dept-of-health-confirms-ransomware-attack state of Maryland] has been repeated compromised by ransomware. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt; Colleges and universities are under increasing threat, include not only the [https://www.govtech.com/education/cyberattack-university-of-maryland.html ransoming of data, but the exposure of personal information] when institutions refuse to pay.  &lt;/ins&gt;Recently [https://www.bleepingcomputer.com/news/security/lincoln-college-to-close-after-157-years-due-ransomware-attack/ Lincoln College] attributed its closing due to the effects of ransomware.  Whole public infrastructures have been held ransom  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IT infrastructures are further potentially compromised with software flaws and exploits, such as [https://www.darkreading.com/vulnerabilities-threats/office-365-files-stored-in-the-cloud-vulnerable-to-ransomware-encryption Microsoft Exchange, Microsoft 365, SharePoint, OneDrive and Teams] which permit attackers to compromise entire networks.  In addition to indirect and random infections, directed attacks have the potential for further disruption.  Purposeful attacks and compromises come from learning a potential victims unique vulnerabilities and network topology.  Too often IT professions rely on such measures as the Common Vulnerability Scoring System (CVSS) and other rating systems without realizing cybercriminals use these low scoring vulnerabilities as means of compromise.  Such instances demand vigilance and staying current on the part of IT professionals and end-users alike.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IT infrastructures are further potentially compromised with software flaws and exploits, such as [https://www.darkreading.com/vulnerabilities-threats/office-365-files-stored-in-the-cloud-vulnerable-to-ransomware-encryption Microsoft Exchange, Microsoft 365, SharePoint, OneDrive and Teams] which permit attackers to compromise entire networks.  In addition to indirect and random infections, directed attacks have the potential for further disruption.  Purposeful attacks and compromises come from learning a potential victims unique vulnerabilities and network topology.  Too often IT professions rely on such measures as the Common Vulnerability Scoring System (CVSS) and other rating systems without realizing cybercriminals use these low scoring vulnerabilities as means of compromise.  Such instances demand vigilance and staying current on the part of IT professionals and end-users alike.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Skychemist5</name></author>
	</entry>
	<entry>
		<id>http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19833&amp;oldid=prev</id>
		<title>Skychemist5 at 16:26, 17 June 2022</title>
		<link rel="alternate" type="text/html" href="http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19833&amp;oldid=prev"/>
		<updated>2022-06-17T16:26:37Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 16:26, 17 June 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l8&quot; &gt;Line 8:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;These attacks are not limited to poorer countries, the [https://www.securitymagazine.com/articles/96901-maryland-dept-of-health-confirms-ransomware-attack state of Maryland] has been repeated compromised by ransomware. Recently [https://www.bleepingcomputer.com/news/security/lincoln-college-to-close-after-157-years-due-ransomware-attack/ Lincoln College] attributed its closing due to the effects of ransomware.  Whole public infrastructures have been held ransom  &lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;These attacks are not limited to poorer countries, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;both [https://technical.ly/civic-news/baltimore-cyberattacks-timeline/ Baltimore] and &lt;/ins&gt;the [https://www.securitymagazine.com/articles/96901-maryland-dept-of-health-confirms-ransomware-attack state of Maryland] has been repeated compromised by ransomware. Recently [https://www.bleepingcomputer.com/news/security/lincoln-college-to-close-after-157-years-due-ransomware-attack/ Lincoln College] attributed its closing due to the effects of ransomware.  Whole public infrastructures have been held ransom  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IT infrastructures are further potentially compromised with software flaws and exploits, such as [https://www.darkreading.com/vulnerabilities-threats/office-365-files-stored-in-the-cloud-vulnerable-to-ransomware-encryption Microsoft Exchange, Microsoft 365, SharePoint, OneDrive and Teams] which permit attackers to compromise entire networks.  In addition to indirect and random infections, directed attacks have the potential for further disruption.  Purposeful attacks and compromises come from learning a potential victims unique vulnerabilities and network topology.  Too often IT professions rely on such measures as the Common Vulnerability Scoring System (CVSS) and other rating systems without realizing cybercriminals use these low scoring vulnerabilities as means of compromise.  Such instances demand vigilance and staying current on the part of IT professionals and end-users alike.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IT infrastructures are further potentially compromised with software flaws and exploits, such as [https://www.darkreading.com/vulnerabilities-threats/office-365-files-stored-in-the-cloud-vulnerable-to-ransomware-encryption Microsoft Exchange, Microsoft 365, SharePoint, OneDrive and Teams] which permit attackers to compromise entire networks.  In addition to indirect and random infections, directed attacks have the potential for further disruption.  Purposeful attacks and compromises come from learning a potential victims unique vulnerabilities and network topology.  Too often IT professions rely on such measures as the Common Vulnerability Scoring System (CVSS) and other rating systems without realizing cybercriminals use these low scoring vulnerabilities as means of compromise.  Such instances demand vigilance and staying current on the part of IT professionals and end-users alike.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Skychemist5</name></author>
	</entry>
	<entry>
		<id>http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19832&amp;oldid=prev</id>
		<title>Skychemist5 at 16:24, 17 June 2022</title>
		<link rel="alternate" type="text/html" href="http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19832&amp;oldid=prev"/>
		<updated>2022-06-17T16:24:50Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 16:24, 17 June 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l13&quot; &gt;Line 13:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The all too often adage is &amp;quot;Failing to plan, is planning to fail.&amp;quot; is in play.  It is equally true that a half hearted effort equally has the potential to end in ruin.  Cyber security involves prevention and response.  Countermeasures towards malicious activates include:  1) Identifying and classifying the assets within infrastructure, to know the critical and non critical devices and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible vs when necessary.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, system design, good computer habits and a cyber hygiene program with a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement and/or replace the role of a CISO in many instances.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The all too often adage is &amp;quot;Failing to plan, is planning to fail.&amp;quot; is in play.  It is equally true that a half hearted effort equally has the potential to end in ruin.  Cyber security involves prevention and response.  Countermeasures towards malicious activates include:  1) Identifying and classifying the assets within infrastructure, to know the critical and non critical devices&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;, core services &lt;/ins&gt;and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible vs when necessary.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, system design, good computer habits and a cyber hygiene program with a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement and/or replace the role of a CISO in many instances.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Skychemist5</name></author>
	</entry>
	<entry>
		<id>http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19831&amp;oldid=prev</id>
		<title>Skychemist5 at 16:23, 17 June 2022</title>
		<link rel="alternate" type="text/html" href="http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19831&amp;oldid=prev"/>
		<updated>2022-06-17T16:23:40Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 16:23, 17 June 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l13&quot; &gt;Line 13:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The all too often adage is &amp;quot;Failing to plan, is planning to fail.&amp;quot; is in play.  It is equally true that a half hearted effort equally has the potential to end in ruin.  1) &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;A starting point is to identify the identify &lt;/del&gt;the assets within infrastructure, to know the critical and non critical devices and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;a &lt;/del&gt;good computer habits and cyber hygiene program &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;and &lt;/del&gt;a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement and/or replace the role of a CISO in many instances.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The all too often adage is &amp;quot;Failing to plan, is planning to fail.&amp;quot; is in play.  It is equally true that a half hearted effort equally has the potential to end in ruin. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt; Cyber security involves prevention and response.  Countermeasures towards malicious activates include: &lt;/ins&gt; 1) &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Identifying and classifying &lt;/ins&gt;the assets within infrastructure, to know the critical and non critical devices and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;vs when necessary&lt;/ins&gt;.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;system design, &lt;/ins&gt;good computer habits and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;a &lt;/ins&gt;cyber hygiene program &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;with &lt;/ins&gt;a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement and/or replace the role of a CISO in many instances.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Skychemist5</name></author>
	</entry>
	<entry>
		<id>http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19830&amp;oldid=prev</id>
		<title>Skychemist5 at 16:17, 17 June 2022</title>
		<link rel="alternate" type="text/html" href="http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19830&amp;oldid=prev"/>
		<updated>2022-06-17T16:17:17Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 16:17, 17 June 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l8&quot; &gt;Line 8:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Recently [https://www.bleepingcomputer.com/news/security/lincoln-college-to-close-after-157-years-due-ransomware-attack/ Lincoln College] attributed its closing due to the effects of ransomware.  Whole public infrastructures have been held ransom  &lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;These attacks are not limited to poorer countries, the [https://www.securitymagazine.com/articles/96901-maryland-dept-of-health-confirms-ransomware-attack state of Maryland] has been repeated compromised by ransomware. &lt;/ins&gt;Recently [https://www.bleepingcomputer.com/news/security/lincoln-college-to-close-after-157-years-due-ransomware-attack/ Lincoln College] attributed its closing due to the effects of ransomware.  Whole public infrastructures have been held ransom  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IT infrastructures are further potentially compromised with software flaws and exploits, such as [https://www.darkreading.com/vulnerabilities-threats/office-365-files-stored-in-the-cloud-vulnerable-to-ransomware-encryption Microsoft Exchange, Microsoft 365, SharePoint, OneDrive and Teams] which permit attackers to compromise entire networks.  In addition to indirect and random infections, directed attacks have the potential for further disruption.  Purposeful attacks and compromises come from learning a potential victims unique vulnerabilities and network topology.  Too often IT professions rely on such measures as the Common Vulnerability Scoring System (CVSS) and other rating systems without realizing cybercriminals use these low scoring vulnerabilities as means of compromise.  Such instances demand vigilance and staying current on the part of IT professionals and end-users alike.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IT infrastructures are further potentially compromised with software flaws and exploits, such as [https://www.darkreading.com/vulnerabilities-threats/office-365-files-stored-in-the-cloud-vulnerable-to-ransomware-encryption Microsoft Exchange, Microsoft 365, SharePoint, OneDrive and Teams] which permit attackers to compromise entire networks.  In addition to indirect and random infections, directed attacks have the potential for further disruption.  Purposeful attacks and compromises come from learning a potential victims unique vulnerabilities and network topology.  Too often IT professions rely on such measures as the Common Vulnerability Scoring System (CVSS) and other rating systems without realizing cybercriminals use these low scoring vulnerabilities as means of compromise.  Such instances demand vigilance and staying current on the part of IT professionals and end-users alike.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Skychemist5</name></author>
	</entry>
	<entry>
		<id>http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19829&amp;oldid=prev</id>
		<title>Skychemist5 at 15:53, 17 June 2022</title>
		<link rel="alternate" type="text/html" href="http://205.166.159.208/wiki/index.php?title=Preventing_and_Mitigating_Ransomware&amp;diff=19829&amp;oldid=prev"/>
		<updated>2022-06-17T15:53:04Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:53, 17 June 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l13&quot; &gt;Line 13:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Call To Action'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;A &lt;/del&gt;all too often adage is &amp;quot;Failing to plan, is planning to fail.&amp;quot;  It is equally true that a half hearted effort equally has the potential to end in ruin.  1) A starting point is to identify the identify the assets within infrastructure, to know the critical and non critical devices and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, a good computer habits and cyber hygiene program and a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement and/or replace the role of a CISO in many instances.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;The &lt;/ins&gt;all too often adage is &amp;quot;Failing to plan, is planning to fail.&amp;quot; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;is in play. &lt;/ins&gt; It is equally true that a half hearted effort equally has the potential to end in ruin.  1) A starting point is to identify the identify the assets within infrastructure, to know the critical and non critical devices and understanding the visibility and context of the attack surface.  2) Isolating and restricting critical intranets from the internet and data access points when possible.  Using cyber risk scoring to systematically to identify weaknesses and vulnerabilities with the highest likelihood of impact.  3) Developing a resilient infrastructure is key to prevention and recovery in the event of any network compromise.  Ideally systems would include internet security and antivirus software, a good computer habits and cyber hygiene program and a means for restoration of services with minimal impact should such need to be implemented.  4) Training IT staff and educating end-users are paramount.  Weakness in awareness and complacency can undermine all of the previous efforts.  Well trained, best practices and informed CIO/CTOs and network admins can supplement and/or replace the role of a CISO in many instances.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Skychemist5</name></author>
	</entry>
</feed>