Summary
Ransomware isn’t going away anytime soon because the ransomware gangs are making so much money. In this chapter, we learned how attackers can gain access to your network and quietly move around in order to find the PII data on your network. It’s imperative to ensure you have RDP and SMB secured. You need to deploy an email scanner to prevent phishing attempts. It’s imperative to know the assets on your network and understand the assets with interfaces on the internet since hackers can easily search these open ports on sites such as Censys.io.
In the next chapter, we will be covering the importance of identification and authentication. When building out a security program, securing your passwords is paramount. We’ll be covering how to prevent 99% of account attacks in the following chapter.