• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Types of Ransomware Attacks and Cyber-Hygiene Best Practices

by CXO Staff
January 26, 2023
in Opinions

Having a ransomware protection strategy that incorporates cyber-hygiene best practices should be top of mind for businesses and their employees.

Types of Ransomware Attacks and Cyber-Hygiene Best Practices
Aamir Lakhani, Global Security Strategist and Researcher at FortiGuard Labs

As the world of technology continues to evolve, so have the types of ransomware attacks that can impact organisations. For most businesses, data is their most valuable asset, and without protections against ransomware in place, employees can put themselves and their organisation at risk of losing critical information. Having a ransomware protection strategy that incorporates cyber-hygiene best practices should be top of mind for businesses and their employees. We’re joined by Aamir Lakhani, Global Security Strategist and Researcher at FortiGuard Labs, to discuss the different types of ransomware attacks along with some ransomware best practices to protect yourself and your business from an attack.

Can you briefly discuss your role at FortiGuard Labs?

My responsibilities as a senior security strategist at Fortinet’s FortiGuard Labs include hunting for the latest attack techniques and making sure we can defend against not only specific attacks using those techniques but any new attacks that may be using the same logic. To do my job effectively, I need to understand networking, reverse engineering, digital forensics, and incident response. Moreover, I need to understand our customers’ business risks and goals. Security should enable organisations to work more efficiently, not impede their existing business goals. As a FortiGuard Labs senior researcher, I work with customers to assess the best options for providing IT security solutions to major enterprises and government organisations based on their unique needs. I have over 22 years of experience in the cybersecurity industry.

What are the different types of ransomware attacks?

There are certainly a variety of different ransomware strains, but they can be broken down into five primary ransomware attacks by types:

  1. Crypto Ransomware or Encryptors: Probably one of the most well-known variants, this malware encrypts various files and data within a system, making the infected content inaccessible without a decryption key. This can also include lockers.
  2. Lockers: Similar to encryptors, but they lock the user out of their system entirely. Generally, the lock screen will display the ransom and demands, and in severe cases, will include a countdown clock to pressure victims into paying.
  3. Scareware: A fake software that claims to have detected a virus or similar issue with your system and directs the user to pay to solve the issue. Some variants will lock the user from other functionalities of the system, while others will flood the screen with pop-up alerts without causing any damage.
  4. Doxware/Leakware: As the name suggests, leakware threatens to distribute sensitive information or company files online and pressures the user into paying a fee to prevent data from being entered into the public domain.
  5. Ransomware-as-a-Service (RaaS): Malware that is carried out and managed by a professional hacker. The service is paid for by an individual, and all aspects of the attack—from the distribution of the malware to payment collection and access restore—are carried out by hired professionals.

Who has to be most concerned about a ransomware attack? Is it primarily businesses or private individuals? 

Ransomware is getting more sophisticated and more destructive. As a cybersecurity researcher, ransomware, to most people’s surprise, is not always the most exciting attack to look at. Attacks targeting artificial intelligence brains, industrial control systems, and automobiles are cutting-edge attacks. However, ransomware has an immediate and visible impact across all industries and many times individuals. If a business is attacked by ransomware and cannot recover, it is possible that the business may be at risk. This has real-world consequences, such as people not being able to work or provide for their families.

Who should be called first after one is aware that they are the victim of a ransomware attack? The local police? The FBI? A cybersecurity expert? 

The first step should be notifying your cybersecurity management team, whether that is the CIO or security manager for an internal security operations center (SOC) team or the platform that an individual uses for their personal computer. Depending on the severity and nature of the attack, the security professional will be able to guide you from there on next steps. The top priority should be bringing the attack to the attention of a trained security expert so that the issue can be resolved as quickly as possible.

Individual organisations may have their own legal or internal notification requirements that must be followed, but it’s important to remember a cyberattack is an attack and can be as deadly as a physical attack. You need to minimise your exposure and understand the problem before reacting.

What are the most common mistakes you have seen companies make that leave them vulnerable to ransomware attacks? 

One of the most common mistakes made by companies is not having complete coverage of all aspects of a system. With the prevalence of remote work and email being one of the most common vectors for ransomware, organisations must ensure there are no loose ends in the system for hackers to exploit. For example, lack of integration can mean too many point products and poor visibility. It can also mean less effective cybersecurity overall. Maintaining proper security measures puts an enterprise in the best position possible for protecting against ransomware. Consolidation and integration are key to maintaining visibility but also mitigation and remediation for example.

“Maintaining proper security measures puts an enterprise in the best position possible for protecting against ransomware. Integration and consolidation into a cybersecurity platform are important.”

What would you recommend CISOs do to help limit the frequency and severity of these attacks? 

First and foremost, equip all systems with the latest in cybersecurity defense and detection solutions. Advanced endpoint detection and response (EDR) technology is a great example because it can detect and mitigate evolving threats. This is very relevant given the WFA reality organisations face today. In addition, ensuring employees are properly trained on threat trends is paramount for prevention, as employees within the network will then be apt to avoid suspicious activity and report it properly. In many cases, keeping systems updated and patched, limiting administrator access, and running common security defensive tools configured correctly are good starting points. Training users to be on the lookout for cybercriminals and raising awareness can exponentially increase your defensive posture to mitigate attacks. These basic tasks are commonly referred to as good cyber hygiene. The Fortinet Training Institute is a good example of how training can make a difference.

What are some ransomware best practices to protect yourself or your business from an attack and why?

Think holistically

Equipping all aspects of the network, from databases to Bluetooth devices, with the latest security measures is essential for preventing ransomware. Deflecting attacks entirely or detecting them as soon as there is a breach is the best thing a business can do to protect its assets. You need to think about the endpoint and all the way to the Linux kernel. Also, you need to be thinking about maximising AI/ML technologies to detect abnormalities, etc. Segmentation and also services such as a digital risk protection service can help proactively find vulnerable issues to address.

Train members in the network on proper security practices

Educating employees on best security practices and proper reporting procedure is key for the shift to telework and will allow security teams to be informed immediately when there is a potential threat.

Report early to prevent malware from lingering

Notify your service provider and security team as soon as a threat begins to emerge. Allowing malware to live within a system will give it the opportunity to spread to other entities within the network and further the damage that can be done.

Gather as much information on the potential threat as possible

When a threat emerges, gather as much information on the source and nature of the attack to patch the system for future prevention. Learning how the ransomware was able to access the network will expose the holes hackers were able to exploit. Reporting details to law enforcement will also aid in tracking down threat actors to prevent repeat attacks.

Learn more about Fortinet’s FortiGuard Labs threat research and global intelligence organisation and Fortinet’s FortiGuard AI-powered Security Services portfolio. Sign up to receive our threat research blogs.

Tags: Cyber Hygienefeatured3ransomware
ShareTweet

Related Posts

Empowering the UAE’s digital future through data sovereignty
Opinions

Empowering the UAE’s digital future through data sovereignty

As the UAE continues to lead the charge in technological innovation, the importance of data sovereignty has never been more...

May 26, 2025
AI agents are set to become an indispensable part of the GCC security apparatus
Opinions

AI agents are set to become an indispensable part of the GCC security apparatus

Middle Eastern countries continue to bet big on AI—and for good reason. National strategies like the UAE Artificial Intelligence Strategy...

May 23, 2025

Discussion about this post

Latest Issue

CVC Joins CD&R as an Investment Partner in Epicor

VAST Data and Cisco expand partnership

June 4, 2025
JAGGAER appoints first Chief Digital & AI Officer

JAGGAER appoints first Chief Digital & AI Officer

June 4, 2025
training skills ups killing

Huawei partners with Nafis to launch Emirati Talent Development Programme

June 4, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.