If you’re relying on cybersecurity software to protect you, think again. Recent research shows that almost 80% of all malware delivered via an encrypted connection goes undetected. That’s why every business should have a response and recovery plan.
Is your business’s antivirus software up to date? Does it detect malware, too? If your answer to both of these questions is “yes”, then you might think you’re fully protected against cyberattack. You might even wonder why IT support companies charge people for cybersecurity services when you can do it all by yourself.
But when it comes to protecting your data, you can’t afford to be complacent. Cybercriminals are inventive, determined, and technically savvy. They are always finding new ways to beat the system and gain access to your business’s most valuable assets. And just recently, they’ve discovered a way to get malware onto your network’s devices undetected. You might not even know the attack has happened until it’s over.
Encrypted threats
In October 2021, a report by WatchGuard Technologies showed that 91.5% of malware was delivered via encrypted connections. Encryption effectively “scrambles” data so that it can’t be intercepted and read by third parties. It’s the same technology that protects your data when you send it via a secure connection such as a virtual private network (VPN).
In other words, the hackers are using a common cybersecurity tool to get past their targets’ defences. And it’s working. According to WatchGuard, 78% of encrypted malware manages to avoid detection by cybersecurity software. That’s nearly four out of five instances.
Now, are you really so sure that your software is enough to protect you?
Proactive planning
Malware attacks have already reached a record high – and they’re still rising. If you value your business’s data, then it’s crucial to install cutting-edge cybersecurity software, and apply every update and patch as it’s issued. You should also deliver regular, up-to-date staff training to make sure every member of your team understands and applies best practice. Checking and verifying your data backup should be a standard part of your daily routine. (If you’re not already backing up your data to a secure cloud server, you really should start now!)
But in these worrying times, prevention still isn’t enough. No cybersecurity strategy is complete unless it includes a response and recovery plan. This plan outlines in detail exactly what you and your team will do if a piece of malware does manage to slip past your system’s defences. From raising the alarm to recovering lost data and repairing client relationships, it’s the best – and only – way to mitigate harm. It will minimise downtime, and limit the financial impact of a potentially disastrous attack.
Planning for the worst-case scenario might feel like pessimism. But in view of the numbers we’ve outlined above, it’s simple realism. Developing a comprehensive response and recovery plan might just save your whole business.
At Perigon One, we deliver comprehensive IT support that’s always realistic about the risks. If you have any questions or are looking for help creating your own effective, custom-made response and recovery plan, why not get in touch?