What is a Ransomware Assessment?
A ransomware assessment involves evaluating your organisation’s attack surface in line with the methods utilised by threat actors to deploy a ransomware attack. This could include social engineering assessments, penetration tests, vulnerability scans, and more. The aim of a ransomware assessment is to provide organisations with insight into how resilient they would be to a ransomware attack and what improvements need to be made to minimise risk.
Rootshell Security’s Ransomware Assessment
We use a blend of approaches to measure your ability to defend, detect, and respond to ransomware attacks. Your ransomware assessment is delivered in three parts, ensuring you receive a thorough and insightful test to guide your next steps.
1. Social Engineering and Perimeter Testing
Your employees’ inability to detect phishing attacks is one of the main reasons why ransomware is on the rise, so it’s essential that your personnel are suitably trained. We can perform email, text, and voice phishing assessments to test your personnel’s susceptibility to malicious correspondence, as well as assess your technical defences and perimeter mail gateways.
- Stress test technical defences and perimeter gateways
- Measure susceptibility of users to social engineering (phishing, SMiShing, and vishing)
- Measure susceptibility of users to clicking on links and opening attachments
2. Operating System and Network Testing
This stage of the ransomware assessment focuses on your organisation’s technical defences. This includes well configured end-point detection and response, securely patched and configured system builds, securely configured security policies, and good general industry recognised best practice.
- Audits and build reviews of nominated servers and workstations
- Detonate controlled payloads and non-sanctioned executable files on the systems
- Password policy reviews and general security best practice alignment
- User password audits
3. Public Facing Infrastructure and Application Testing
Detecting and addressing weaknesses within your public facing infrastructure and applications is essential to preventing ransomware attacks. Our CREST-certified testers will perform penetration tests and vulnerability scans to test for issues and potential exploitation points. We recommend that public facing infrastructure and applications are assessed on a regular basis, as threat actors and new vulnerabilities are ever-evolving.
- Unauthenticated public facing infrastructure assessments with false positive reduction and manual confirmation
- Unauthenticated public facing application assessments with false positive reduction and manual confirmation
- We can also conduct these assessments from an authenticated perspective
Manage and Improve Your Ransomware Resilience with The Rootshell Platform
The Rootshell Platform is a vendor-agnostic vulnerability management solution that puts you at the centre of your IT security ecosystem. Consolidate assessment results, accelerate remediation from start to finish, and gain real-time insight into your ever-changing threat landscape.
Why Rootshell’s Ransomware Assessment?
We’re proud to be a trusted provider of cyber security testing for some of the UK’s largest organisations.
- Holistic approach: Our expertise in the full suite of security assessments means we can test an exhaustive number of ransomware attack methods, providing you with the most in-depth ransomware assessment.
- Subject matter experts: We provide industry-leading testing services to some of the largest businesses in the UK. Our extensive experience and understanding of how threat actors operate means we can deliver the most robust ransomware assessment possible.
- Quality assured: Our CREST-certified testers deliver security assessments to the highest industry standards, such as Open Web Application Security Project (OWASP) guidelines, the National Institute for Standards and Technology (NIST), and the Penetration Testing Execution Standard (PTES).