Ransomware attacks are at a
record high, threatening organizations with financial and
reputational risk. Run this web-based test to assess your
organization’s defenses against popular ransomware attack tactics.
Why run this assessment?
Safe,
non-invasive test runs in seconds
Uncover
risks and vulnerabilities
Learn how
to improve your ransomware risk posture
Ransomware Attack Chain
Attacker
Initial Compromise
Lateral Movement
Data Loss/Exfiltration
Ransomware
Execution and Data Encryption
Initial Compromise
The first thing an attacker
must do is gain entry into a system, often by tricking a user into
downloading an infected file or clicking a malicious link. Your
first line of defense is to block these actions.
Lateral Movement
Once an attacker is in your
system, they attempt to move around the network to cause damage or
steal valuable assets. Many legacy security tools allow broad
access to valuable assets once an attacker gets in.
Data Loss/Exfiltration
Many attacks include data
theft, such as PII, financial data, or intellectual property. Your
security controls must recognise and stop attempts to steal
valuable data.
Running
Initial Compromise Tests...
Running
Lateral Movement Tests...
Running
Data Loss/Exfiltration Tests...
Results
Your
Ransomware Risk Assessment
Critical
LowMediumHighCritical
Initial Compromise
Tests |
Failed
Lateral Movement
Tests |
Failed
Data
Loss/ Exfiltration
Tests |
Failed
You failed out of tests on your
ransomware risk assessment. Your organization is at risk of a
ransomware attack. Please enter your name and email to review the
detailed results and recommendations.
You failed out of tests on your ransomware risk
assessment. Your organization is at risk of a ransomware attack. We
encourage you to review the detailed results along with the
recommendations to address any risk. For any questions on how to
eliminate risks with a true Zero Trust Exchange, please contact us.