b'Below are some measures that can be taken to help mitigate the risk of and FOGHORN FOCUSminimize the impact of a successful ransomware attack to your organizations:Secure Assets & Software Backup Implement controls to prevent unauthorized softwareEnsure that sufficient, routine system and information from running on your computers backups are conducted so that data can be restored; store backup information offline to reduce the risk of being Access Controlimpacted by the attack and, test backups to ensure they are Restrict the use of accounts with administrativein working order and capture all the data required to quickly permissions to only necessary functions, to includeresume normal operations in the event of an attack.restricting access to email and the webMaintenance Training Ensure computers, devices, and applications are patched and Ensure your staff knows how to identify and avoidup-to-date, that software and system updates are conducted ransomware, what the indicators are if affected, andimmediately upon availability of new versions, that who to call to quickly neutralize and mitigate the spread.default or factory logins are secured, and that unused or More specifically, CISA identifies phishing emails asunnecessary ports, protocols, and services are disabled.an infection vector for ransomware and recommends providing staff with training and guidance on how toMalware Defense identify and report suspicious emails Implement endpoint security tools, to include endpoint detection and response capabilities. Install and regularly update anti-virus or anti-malware software on all hosts; use network segregation to isolate critical functions from non-critical functions; ensure use of multi-factor authentication for remote access; and, ensure accounts follow the principle of least access.FOGHORN FOCUS: OPERATIONS 10 FOGHORN'