Sie sind auf Seite 1von 3

Prevent Ransomware using Trend Micro products and solutions h ps://success.trendmicro.com/solution/1112223-ransomware-s...

Search Support

Updated: 4 Aug 2017 Product/Version: Cloud App Security All.All , Platform: N/A N/A

SUMMARY
Trend Micro has seen a dramatic rise of ransomware-related issues (http://www.trendmicro.com/vinfo/us/security
/definition/ransomware), especially the sophisticated Crypto-Ransomware (http://blog.trendmicro.com/crypto-
ransomware-attacks-the-new-form-of-kidnapping/). The issue concerns both home and commercial users. Like
many other cyber threats, ransomware has become more complex and advanced over time. Thus, the prevention
and protection become more challenging.

Ransomware can enter an organization through many vectors, such as email spam, phishing attacks, or malicious
web downloads. For highest level of protection, organizations are encouraged to deploy multiple layers of protection
on endpoint, gateway, and mail servers.

The image below shows a typical ransomware infection chain. For more details about infection chain, refer to this
article: Mitigating the TROJ_CRYPWALL (also known as Cryptowall) v3 using Trend Micro products (/solution
/1112019-mitigating-the-troj-crypwall-v3-using-trend-micro-products ).

Contact Support Download Center Product Documentation

(/contact-support-north-america) (http://downloadcenter.trendmicro.com/) (http://docs.trendmicro.com/en-


us/home.aspx)
Need Help?
(https://esupport.trendmicro.com

Support Policies Product Vulnerability Ideas Exchange


(http://www.trendmicro.com/)
(/support-policies) (/vulnerability-response) (/IdeasExchange)
North America

Business Support Home (/business-support)

Legal Policies & Privacy (http://www.trendmicro.com/us/about-us/legal-policies/index.html)


/media/13673527/crypwall%20v3.jpg)
Site Map (/sitemap)
This article discusses Trend Micro's recommended configuration on various products and important software
FAQ (/faq)to better protect against and combat ransomware.
updates
Feedback (/survey/solution/1112223-ransomware-solutions-best-practice-configuration-and-prevention-using-trend-
micro-products)
Copyright © 2017 Trend Micro Incorporated.
All rights reserved.

1 de 3 04/09/2017 19:52
Prevent Ransomware using Trend Micro products and solutions h ps://success.trendmicro.com/solution/1112223-ransomware-s...

DETAILS

Trend Micro has created a Computer Based Training (CBT) module for customers to help answer the FAQs about
Ransomware. Please click here (https://esupport.trendmicro.com/media/13656272/FAQ_Ransomware.swf) to view
the module.

Trend Micro has several solutions leveraging the Trend Micro™ Smart Protection Network™. It helps administrators
block ransomware threats from possible points of infection. Get the latest versions of these solutions, including
service packs and critical patches, from the Trend Micro Download Center (http://downloadcenter.trendmicro.com/).

EXPAND ALL

Endpoint Protection Layer

Hybrid Cloud Security

Email and Gateway Protection Layers

Network Defense

Central Management Console

Mobile

Victims who have been affected by ransomware can generally attest to the pain and complexity of trying to recover
after such an attack. Increased user awareness and vigilance can save a potential victim time and money in the
unfortunate event of an attack. Preventing the attack in the first place is still the most effective way of dealing with
this threat.

The following is a list of some preventative measures that users and administrators can employ as best practices:

Regular back ups of critical data in case of any sort of loss (not just ransomware). Need Help?

Timely application of software patches from OS and third-party vendors.

Exercise good email and website safety practices – downloading attachments, clicking URLs or executing
programs only from trusted sources.

Encourage users to alert IT Security team of potentially suspicious emails and files.

Ensure your security products are updated regularly and perform periodic scans.

Implement application whitelisting on your endpoints to block all unknown and unwanted applications.

Regular user education around the dangers and signals of social engineering.

Trend Micro continues to devote countless hours of research into new ways of combating these threats and to
update our users with the latest information and recommendations through our Security Intelligence Blog
(http://blog.trendmicro.com/trendlabs-security-intelligence/?s=ransomware&Submit;=+Go+) and Knowledge Base
(https://success.trendmicro.com/).

In addition, your authorized Trend Micro support representative is available for any questions regarding the
configuration options mentioned in this advisory to combat ransomware.

2 de 3 04/09/2017 19:52
Prevent Ransomware using Trend Micro products and solutions h ps://success.trendmicro.com/solution/1112223-ransomware-s...

Rating:
178 found this helpful

Category:
Configure

Solution Id:
1112223

FEEDBACK

Did this article help you? Yes No

RELATED ARTICLES

Best Practices in enhancing protection against malware threats in Worry-Free Business Security/Services
(WFBS/WFBS-SVC) (/solution/1039099-best-practices-in-enhancing-protection-against-malware-threats-in-worry-
free-business-security-servi)

Preventing WannaCry (WCRY) ransomware attacks using Trend Micro products (/solution/1117391-preventing-
wannacry-wcry-ransomware-attacks-using-trend-micro-products)

Petya (2017) Ransomware Attack Information (/solution/1117665-petya-2017-ransomware-attack-information)

(/TS_Portal_ImproveExperienceModal)

Need Help?

3 de 3 04/09/2017 19:52

Das könnte Ihnen auch gefallen