• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Make your Business Ransomware Aware in 10 Easy Steps

You are here: Home / Security News / Make your Business Ransomware Aware in 10 Easy Steps

Ransomware has been in the news regularly recently due to the ‘WannaCry’ attacks and more recently the Petya attacks that begun on the 28th of June 2017.

The Petya malware was delivered as an infected Microsoft Word file that is sent attached in an email, disguised as a job offer, an invoice, or relevant documentation. As per our usual advice, if an email seems suspect or too good to be true, delete it.

Data loss can be embarrassing and expensive due to business interruptions,time spent rectifying the problem and the associated revenue loss.

It can also negativelty effect the businesses reputation resulting in a loss of customers. It is important to keep in mind the new Privacy Amendment (Notifiable Data Breaches) Act 2017 which make it mandatory for organisations to report data breaches.

Patches are the main preventative measure to address ransomware attacks, so make sure that all your software is up to data and if possible make sure it is is set up to auto check and update on a regular basis.

Failing patches or other controls, backups remain the other main source of protection against ransomware and ensuring that data is protected.

To help minimise the risk of ransomware, organisations should have a recent Business Impact Analysis (BIA).  A BIA identifies the systems and processes that are critical to the operation of the business that need to be managed and restored quickly in an event of an outage.

It is important to set the organisations Recovery Point Objective (RPO).  In simple terms, RPO is how often you choose to back up. For example, every hour, day or week.  This will be dependent on how often and how much data changes in the system over time. This will affect the Work Recovery Time (see below).

Organisations should determine its Maximum Tolerated Downtime (MTD). The MTD is the sum of the Recovery Time Objective (RTO) and the Work Recovery Time (WRT).  RTO is how quickly the business can restore critical systems and WRT involved re-keying in the data lost while the system was down.

In summary, to prevent ransomware and avoiding data loss we at Agilient also recommend:

  1. Having a clearly defined BIA to ensure the business is aware of its critical processes and how long they can be off-line before damage or catastrophic damage to the business is incurred.
  2. Mitigate known vulnerabilities by installing patches promptly when released. Particular patch operating system and applications such as Flash, web browsers, Microsoft Office, Java and PDF viewers. In terms of the recent attacks, the Microsoft security update patch MS17-010 should be installed.
  3. Disable untrusted Microsoft Office (and other) macros.
  4. Restrict administrative privileges to operating systems and applications based on users duties.
  5. Have a properly configured firewall. Consider Application whitelisting or blacklisting. A whitelist only allows selected software applications to run on computers. A blacklist prevents selected software applications to run on computers. Also, install antivirus software on each PC.
  6. Educate staff about social engineering exploits used by hackers and what to do if they encounter suspicious correspondence both online or through other means. Agilient have recently seen a lot of social engineering exploits being undertaken by phone, so be aware of suspect callers. Interestingly, social engineering remains one of the biggest weaknesses in an organisations cyber security system. Agilient provides industry leading training in this area.
  7. Perform regular backups of data as backups are the main protection against ransomware and other threats such as hardware failure.
  8. Ensuring that backups are kept in more than one location e.g. onsite, offsite and cloud backups.
  9. Perform regular testing on backups to ensure all data is restorable and to calculate an expected RTO.
  10. Archives of backups should be kept and stored in case of the most recent version of data backup is compromised. Keep in mind if you backed up yesterday or last week and there was ransomware embedded in the backup it will also be compromised.

For further information on information IT backups and recovery see: ISO/IEC 27031:2011 – Information technology, Security techniques and Guidelines.

 

If you are infected by this ransomware:

  • Immediately turn off the computer. This will prevent the ransomware from attempting to spread across the network.
  • Do not attempt to contact the threat actors of the email, either by replying to the email or any other means. Do not open any attachments or click on any hyperlink.

For further information on the impact of Ransomware and services we provide to help mitigate all types of Malware do not hesitate to contact Agilient.

 

The Agilient Team

 

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane