Following the recent SamSam hack on five of 13 local government departments in Georgia, we are once again left wondering if there is anything firms and their clients can do to protect their networks from security breaches.
Attacking organizations is part of an alarming trend from the group deploying SamSam. They are freezing their computer systems and demanding a relatively small ransom, knowing the organization would rather pay up than remain offline for a week or pay to fix it themselves.
We’ve already discussed why accounting firms need an IT strategy and what characteristics that IT strategy needs to have. Now, we want to highlight a more nuanced look at what steps your firm needs to take to build a holistic IT security strategy to limit vulnerabilities and strengthen your network's security.
What Does It Mean to Have a Holistic Security Strategy?
In the past, the most common approach to IT security has focused on layers of perimeter defenses and building the best “wall” possible. But, because these attacks have become more sophisticated over time that approach is no longer sufficient.