Seeing questions today from very small orgs on what *they* can do re. the heightened ransomware threat.
Let's review the essential, no-cost things these orgs can--and must--do to hugely reduce risk:
Counter attacks that use:
1. Office macros
2. RDP
3. Net-facing vulnerabilities
I can't emphasize this enough: Microsoft Office cannot be used with reasonable security by organizations on PCs where users have access to email and web browsing without changing the default macro settings.
Period.
You should also look at this excellent information on the topic of hardening Office against macro threats:
https://www.cyber.gov.au/sites/default/files/2019-03/Microsoft_Office_Macro_Security.pdf
2. Attackers are prolifically using RDP and other forms of remote access to break into organizations via weak passwords and shared passwords that have been compromised.
If these are needed, use 2FA. But at minimum all remote access accounts MUST have unique, strong passwords.
"Strong" passwords, for current purposes, are at least 12 random characters in length or 3-4 randomly chosen words from the dictionary.
Be mindful to look for "dangling" remote access. That is, remote access that is no longer used but was never disabled.
3. Finally, anything that faces the Internet MUST be up-to-date on patching. Routers. Firewalls. VPNs. RDP. Mail servers. Etc.
You can follow @arekfurt.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: