• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

The White House Addresses Ransomware: 6 Security Practices to Implement Now

The 2020’s have been off to a tumultuous start. As the COVID-19 pandemic battles on, another pandemic has been riding its wave. Industries of all types have been feeling the effects of increased cyber-attacks, specifically related to ransomware, and there are no signs that these attacks will slow anytime soon.  

Ransomware is commonly spread through phishing scams, in which a malicious actor tricks the victim into giving away personal or identifying information. The hackers then use this information to gain unauthorized access to accounts, networks, computers, and more. Once in, they can encrypt important and necessary data and hold it ransom until their demand is paid.  

Revolt Against Ransomware: 6 Recommendations from the Government  

Ransomware has become a momentous hazard and as more industries undergo a digital transformation, this cyber threat reaches further into every corner of our society. Due to the increased threats and damages associated with ransomware, the U.S. government is taking a more active role in increasing the awareness of this cyber threat. On May 12, 2021, President Biden issued an executive order on improving the nation’s cyber security.  

In June 2021, just following that executive order, Anne Neuberger (Deputy Assistant to the President and Deputy to the National Security Advisor for Cyber and Emerging Technology) released a letter urging corporate executives and business leaders to take immediate action against ransomware.  

Here’s what they deemed were “essential actions” that every organization should take: 

  1. Implement the following security practices immediately:  
  • Utilize Multi-Factor Authentication 

Multi-Factor Authentication (MFA), also referred to as two-factor authentication (2FA),  allows users to provide two pieces of identification information before gaining access to an account, as opposed to a single password. 

  • Adopt Endpoint Detection & Response 

Once you’re a victim of a ransomware attack, malware can be very difficult to detect within your system. The longer it goes undetected, the more damage it does. Endpoint Detection and Response (EDR) detects threats that have entered your environment through continuous file and system analysis. If a threat is detected, EDR quarantines the file or kills the malicious program to prevent it from causing further damage and eliminates it. 

  • Use Encryption 

When information and data at rest are encrypted, it’s translated into a scrambled, unintelligible language that is useless to unauthorized viewers. Only the user with the encryption key can decrypt the data. Should initial ransomware defenses fail, and a malicious actor gain unauthorized access to encrypted data, they’ll be unable to decipher and use it.

  • Create a Skilled & Empowered Security Team 

As cyber threats and ransomware attacks are ever evolving and continue to get more advanced (with higher ransom demands), your security team has a never-ending job of staying on top of the latest threats. As they follow the development of ransomware and work to implement the most innovative security products, your team must remain  highly motivated. For those who don’t have the capacity for an in-house security team, this can be outsourced to a provider, like Arraya, to ensure you’re getting the insight and expertise needed to combat ransomware. 

  • Share & Incorporate Threat Information in Your Defenses 

Sharing information related to cyber threats, incidents, and vulnerabilities helps everyone better understand these threats and how to appropriately respond to them. The U.S. Department of Homeland Security (DHS) and Department of Justice (DOJ) have joined forces to launch a new website to provide organizations with ransomware-related resources, which includes information on reporting ransomware incidents to both the FBI and CISA.  

  1. Backup Your Data 

When a ransomware attack strikes, victims face financial harm in multiple ways. They’re unable to access important data that’s necessary to run their business, which can result in significant business interruption costs, and they face the potential ransom demand, itself (although the FBI recommends you do not pay these demands). Ensuring your data is regularly backed up will allow you to continue operating, as normal, should data be encrypted. It’s important that backups are not connected to the business network as most hackers will aim to delete any accessible backups.  

  1. Update & Patch Operating Systems, Applications & Firmware 

While the constant reminders and pop ups for software updates and patches may get annoying, they’re important. These should always be completed in a timely manner (ASAP) to ensure the system remains as secure as possible. You may want to consider a centralized patch management system, which updates numerous devices through one platform.  

  1. Test Your Incident Response Plan 

No matter how secure a system is, there’s always a way for a malicious actor to get through. If you have an incident response plan in place, this is a good step in preparing for an attack. However, you should be testing your plan to expose any potential gaps in your security. Start out by running through some core questions to build/enhance your plan. Should certain systems fall victim to an attack, can you sustain business operations? For how long? Who needs to be involved when responding to a potential breach? What’s everyone’s individual role? Run drills regularly to make sure all parties are clear on the plan.  

  1. Test Your Security Team 

Using a third-party to test the security of your systems is a great way to expose vulnerabilities that your organization may have overlooked. Whether your team is unaware of a new threat, a solution isn’t working correctly, or someone made a mistake, it’s better that a professional expose these errors before a hacker does.  

  1. Segment Networks 

Maintaining separate networks for corporate business functions and manufacturing/production operations can help isolate a cyber-attack, should you fall victim. Limiting internet access to operational networks is generally a safer practice and it’s important to maintain manual controls in the event they’re needed. Contingency plans should be tested regularly to ensure all run as intended.  

The U.S. Department of Homeland Security (DHS) and the Department of Justice (DOJ) have joined forces to launch a new website to provide organizations with resources to learn more about ransomware and how to both prevent and respond to these attacks. 

Next Steps: Act Now Against Ransomware 

Cyber security is a much better investment than paying a ransom demand in the long term. In 2020, victims paid $350 million in ransom demands, which was a 311% increase from the prior year.  

It’s important to view your cyber security posture realistically, knowing that it’s not a matter of if you’ll fall victim to a ransomware attack, but when.  

To learn more about how you can take immediate steps to improve your security posture against ransomware, speak with one of Arraya’s experts today.  

Visit https://www.arrayasolutions.com//contact-us/ to connect with our team now.  

Comment on this and all of our posts on: LinkedIn, Twitter and Facebook.   

Follow us to stay up to date on our industry insights and unique IT learning opportunities.   

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}