How Avoiding Ransomware is like Avoiding the Coronavirus
Posted: March 13, 2020 to Compliance.
It's no coincidence that the maturity levels in the new Cybersecurity Maturity Model Certification (CMMC) are being referred to as levels of "cyber hygiene." The World Health Organization (WHO) has been advising us that the most efficient way to protect against the Coronavirus (COVID-19) is to wash our hands regularly for at least 20 seconds and stay out of public places; just like with the Cornoavirus, sometimes it's those basic hygiene practices that are the most effective prophylactic when protecting against ransomware. Think of your body as your computer and ransomware, like the Coronavirus, is trying to infect you. How do you defend against it? Most people will automatically think "face mask," just like they think "antivirus software." They both seem like good ideas, but in all actuality, face masks are about as effective at protecting you from the Coronavirus as basic antivirus software is at protecting your computer from being infected with ransomware: not effective at all. In fact, they can both hurt you by tricking you into believing you're safe when you're not. Think about it; if you believe a face mask will protect you from the Coronavirus, you're more likely to go places that might expose you to the virus. Same thing with a computer; if you believe your antivirus software is protecting you, maybe you will be more likely to click on a suspicious link or open an attachment from an unknown sender because what harm can come from that if you paid for basic antiviral protection, right? *Sigh* That is just asking for a hacker to come in, encrypt your data and hold it ransom in exchange for a significant amount of bitcoin.Basic Hygiene
The best way to avoid getting infected with ransomware is NOT to rely on your antiviral software, just like you shouldn't rely on a face mask to keep you from getting the Coronavirus. The best way to avoid both ransomware and the Coronavirus are to practice basic hygiene regularly. To practice basic cyber hygiene, you'll want to use the CMMC maturity level 1 for inspiration:Access Control (AC)
- AC.1.001: Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
- AC.1.002: Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
- AC.1.003: Verify and control/limit connections to and use of external information systems.
- AC.1.004: Control information posted or processed on publicly accessible information systems.
Identification and Authentication (IA)
- IA.1.076: Identify information system users, processes acting on behalf of users, or devices.
- IA.1.077: Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
Media Protection(MP)
- MP.1.118: Sanitize or destroy information system media containing sensitive data or info before disposal or release for reuse.
Physical Protection (PE)
- PE.1.131: Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.
- PE.1.132: Escort visitors and monitor visitor activity.
- PE.1.133: Maintain audit logs of physical access.
- PE.1.134: Control and manage physical access devices.
Systems and Communications Protection (SC)
- SC.1.175: Monitor, control and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.
- SC.1.176: Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
Systems and Information Integrity (SI)
- SI.1.210:Identify, report, and correct information system flaws in a timely manner.
- SI.1.211: Provide protection from malicious code at appropriate locations within organizational information systems.
- SI.1.212: Update malicious code protection mechanisms when new releases are available.
- SI.1.213: Perform periodic scans of information systems and real-time scans of files from external sources as files are downloaded, opened, or executed.