A letter from the White House regarding ‘What To Do To Protect Against The Threat of Ransomware’.

A letter from the White House regarding ‘What To Do To Protect Against The Threat of Ransomware’. On the second page, you will find the U.S. Government’s recommended best practices – we’ve selected a small number of highly impactful steps to help you focus and make rapid progress on driving down risk.
FROM: Anne Neuberger, Deputy Assistant to the President and Deputy National Security Advisor for Cyber and Emerging Technology
The number and size of ransomware incidents have increased significantly, and strengthening our nation’s resilience from cyberattacks – both private and public sector – is a top priority of the President’s. Under President Biden’s leadership, the Federal Government is stepping up to do its part, working with like-minded partners around the world to disrupt and deter ransomware actors. These efforts include disrupting ransomware networks, working with international partners to hold countries that harbor ransomware actors accountable, developing cohesive and consistent policies towards ransom payments, and enabling rapid tracing and interdiction of virtual currency proceeds.
Implement the five best practices from the President’s Executive Order:
- Backup your data, system images, and configurations, regularly test them, and keep the backups offline:
- Update and patch systems promptly:
- Test your incident response plan:
- Check Your Security Team’s Work:
- Segment your networks:
Get In Touch
Share On Social Media
Other Recent Blog Articles
EDR Unlocked: The Secret Weapon Against Cyber Nasties
Want to understand how to better protect your digital world? This week on Breaking Down I.T. with Steve, we’re exploring EDR. We’ll break down what it is, what it stands…
Read MoreImagine your business is like a really important house, like a bank or a hospital, filled with valuable information. Keeping it secure from digital “burglars” is crucial!
Imagine your business. It’s not just an office or a storefront anymore; it’s a digital vault. Inside reside your most valuable assets: customer data, financial records, intellectual property, and the…
Read MoreBreaking Down I.T. with Steve: Is Your Small Business a Hidden Target? The Importance of Vulnerability Scanning
This week on “Breaking Down I.T. with Steve,” we’re tackling a critical topic that every small business owner in the Pacific Northwest needs to understand: vulnerability scanning. You might think…
Read More