RECOMMENDED BEST PRACTICES AGAINST PHISHING
ENSURE YOU HAVE GOOD AND RECENT BACKUPS
A useful method for recovering from a ransomware attack, as well as from other types of malware infections, is to restore from a known, good backup taken as close as possible to the point before the infection occurred.
DEPLOY ANTI-PHISHING AND ANTI-RANSOMWARE SOLUTIONS
Every organization should implement solutions that are appropriate to its security infrastructure requirements, but with specific emphasis on the ability to detect, isolate and remediate phishing and ransomware threats.
USE ROBUST THREAT INTELLIGENCE
Every organization should use historical and real-time threat intelligence to minimize the potential for infection. Real-time threat intelligence can provide a strong defense to protect against access to domains that have a poor reputation and, therefore, are likely to be used by Hackers for spearphishing, ransomware and other forms of attack. Threat intelligence can also be used proactively by security analysts and others to investigate recent attacks and discover previously unknown threat sources.
Moreover, historical threat intelligence — such as a record of Whois data that includes information on who has owned domains in the past — can be useful in conducting cybercrime investigations.