{"id":6547,"date":"2023-02-08T11:48:57","date_gmt":"2023-02-08T16:48:57","guid":{"rendered":"https:\/\/ptp.cloud\/?p=6547"},"modified":"2025-07-21T20:00:49","modified_gmt":"2025-07-22T00:00:49","slug":"protection-against-ransomware-tips","status":"publish","type":"post","link":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/","title":{"rendered":"5 Proven Ransomware Protection Strategies for Life Sciences and Biotech"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;|auto|-12px|auto||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]\n<article><!-- [et_pb_line_break_holder] -->  <pee><!-- [et_pb_line_break_holder] -->    The threat of ransomware persists. According to the<!-- [et_pb_line_break_holder] -->    <a class=\"\" href=\"https:\/\/intel471.com\/\" target=\"_new\" rel=\"noopener\">Intel 471 Year in Review<\/a>, the United States remains the most targeted country globally, accounting for 39% of all ransomware attacks. The UK follows distantly at 9%. With new variants like LockBit 2.0 and LockBit 3.0 gaining momentum, it\u2019s clear the danger is not only ongoing\u2014but evolving.<!-- [et_pb_line_break_holder] -->  <\/pee><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <pee><!-- [et_pb_line_break_holder] -->    For biotech and life sciences organizations, ransomware attacks pose a major risk to patient data, research continuity, and regulatory compliance. Instead of panicking or overspending on unnecessary, high-cost cybersecurity tools, the expert<!-- [et_pb_line_break_holder] -->    <a class=\"\" href=\"https:\/\/ptp.cloud\/services\/secops\/\" target=\"_new\" rel=\"noopener\">security team at PTP<\/a> recommends five proven strategies to drastically reduce your organization\u2019s ransomware risk.<!-- [et_pb_line_break_holder] -->  <\/pee><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<div style=\"position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;\"><!-- [et_pb_line_break_holder] -->    <iframe style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\"<!-- [et_pb_line_break_holder] -->            src=&#8221;https:\/\/www.youtube-nocookie.com\/embed\/KdPetqNLg7s?rel=0&#8243;<!-- [et_pb_line_break_holder] -->            title=&#8221;Protection Against Ransomware: Tips from PTP&#8221;<!-- [et_pb_line_break_holder] -->            frameborder=&#8221;0&#8243;<!-- [et_pb_line_break_holder] -->            loading=&#8221;lazy&#8221;<!-- [et_pb_line_break_holder] -->            allow=&#8221;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&#8221;<!-- [et_pb_line_break_holder] -->            allowfullscreen<!-- [et_pb_line_break_holder] -->            referrerpolicy=&#8221;strict-origin-when-cross-origin&#8221;><!-- [et_pb_line_break_holder] -->    <\/iframe><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<div style=\"text-align: center; margin: 1.5em 0;\"><!-- [et_pb_line_break_holder] -->    <a href=\"https:\/\/www.youtube.com\/watch?v=KdPetqNLg7s\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Watch the full video on YouTube\" style=\"text-decoration: none;\"><!-- [et_pb_line_break_holder] -->      <strong>Watch the full video on YouTube<\/strong><!-- [et_pb_line_break_holder] -->      <img decoding=\"async\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2024\/09\/Youtube-icon-300x300.png\"<!-- [et_pb_line_break_holder] -->           alt=&#8221;YouTube official company logo&#8221;<!-- [et_pb_line_break_holder] -->           width=&#8221;26&#8243; height=&#8221;26&#8243; loading=&#8221;lazy&#8221; decoding=&#8221;async&#8221;<!-- [et_pb_line_break_holder] -->           style=&#8221;vertical-align: middle; margin-left: 8px;&#8221; \/><!-- [et_pb_line_break_holder] -->    <\/a><!-- [et_pb_line_break_holder] -->    <!\u2013- [et_pb_br_holder] -\u2013><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<hr>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<h3>1. <strong>Patch Everything<\/strong><\/h3>\n<p><!-- [et_pb_line_break_holder] -->  <pee>Establish a disciplined <a class=\"\" href=\"https:\/\/ptp.cloud\/services\/secops\/vulnerability-management\/\" target=\"_new\" rel=\"noopener\">vulnerability management<\/a> process and act on its findings. Unpatched devices\u2014whether a smart light controller, an outdated Windows 2008 server, or an unattended FedEx print station\u2014present low-hanging fruit for attackers. If it&#8217;s connected to the network, it&#8217;s a potential entry point.<\/pee><!-- [et_pb_line_break_holder] -->  <pee>For biotech IT services and secure lab environments, patching is essential to prevent avoidable breaches in regulated research IT infrastructure.<\/pee><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<hr>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<h3>2. <strong>Ensure Offsite Backups<\/strong><\/h3>\n<p><!-- [et_pb_line_break_holder] -->  <pee>Follow the 3-2-1 backup rule: three total copies of your data, two stored locally on different mediums, and one offsite. As a <a class=\"\" href=\"https:\/\/www.veeam.com\/become-a-partner\/service-providers.html\" target=\"_new\" rel=\"noopener\">Veeam VCSP partner<\/a>, PTP offers reliable backup services to maintain business continuity\u2014even in the face of ransomware.<\/pee><!-- [et_pb_line_break_holder] -->  <pee>This is critical for compliant IT services for research labs and maintaining HIPAA and GxP data integrity.<\/pee><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<hr>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<h3>3. <strong>Perform a Business Impact Analysis<\/strong><\/h3>\n<p><!-- [et_pb_line_break_holder] -->  <pee>Work directly with your business owners and executives to understand what data and functions are mission-critical. Identify what you can afford to lose and what must be protected at all costs. This aligns with the &#8220;Identify&#8221; function of a <a class=\"\" href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-53\/rev-5\/final\" target=\"_new\" rel=\"noopener\">NIST 800-53 Self-Assessment<\/a>.<\/pee><!-- [et_pb_line_break_holder] -->  <pee>Life sciences IT support must include impact analysis to prioritize data protection and ensure MSP compliance for clinical research.<\/pee><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<hr>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<h3>4. <strong>Verify an Incident Response Plan<\/strong><\/h3>\n<p><!-- [et_pb_line_break_holder] -->  <pee>An <a class=\"\" href=\"https:\/\/ptp.cloud\/services\/secops\/security-risk-assessment\/\" target=\"_new\" rel=\"noopener\">incident response plan<\/a> must exist, be accessible offline, and cover a total loss scenario\u2014including being locked out of Azure AD, Okta, or O365. Don\u2019t assume cloud means immunity\u2014it doesn\u2019t.<\/pee><!-- [et_pb_line_break_holder] -->  <pee>Biotech and research labs benefit from managed IT for labs that supports incident response, HIPAA audits, and disaster recovery scenarios.<\/pee><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<hr>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<h3>5. <strong>Layered Security: EDR and DNS Filtering<\/strong><\/h3>\n<p><!-- [et_pb_line_break_holder] -->  <pee>Deploy <a class=\"\" href=\"https:\/\/ptp.cloud\/services\/secops\/security-monitoring\/\" target=\"_new\" rel=\"noopener\">endpoint detection and response (EDR)<\/a> technology and a second layer like <a class=\"\" href=\"https:\/\/ptp.cloud\/services\/secops\/dns-security-cisco-umbrella\/\" target=\"_new\" rel=\"noopener\">DNS filtering<\/a> or egress traffic control. DNS filtering blocks users from reaching known malicious domains, while EDR detects and neutralizes threats at the endpoint level\u2014your last line of defense.<\/pee><!-- [et_pb_line_break_holder] -->  <pee>These are core components of secure IT services for biotech and scientific computing IT support that defend intellectual property and research continuity.<\/pee><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<hr>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <pee><strong>Cybersecurity is about discipline, not just tools.<\/strong> Taking these five steps helps you maintain operational resilience and keeps your organization protected against ransomware threats.<\/pee><!-- [et_pb_line_break_holder] -->  <pee>\u2014<\/pee><!-- [et_pb_line_break_holder] -->  <pee><em>Authored by:<\/em><!\u2013- [et_pb_br_holder] -\u2013><!-- [et_pb_line_break_holder] -->    <a class=\"\" href=\"https:\/\/www.linkedin.com\/in\/richard-hauke-492bab1\/\" target=\"_new\" rel=\"noopener\">Rich Hauke, CISSP<\/a> &#038;<!-- [et_pb_line_break_holder] -->    <a class=\"\" href=\"https:\/\/www.linkedin.com\/in\/gary-derheim-86439\/\" target=\"_new\" rel=\"noopener\">Gary Derheim<\/a><!-- [et_pb_line_break_holder] -->  <\/pee><!-- [et_pb_line_break_holder] --><\/article>\n<p>\u00a0<script type=\"application\/ld+json\"><!-- [et_pb_line_break_holder] -->{<!-- [et_pb_line_break_holder] -->  \"@context\": \"https:\/\/schema.org\",<!-- [et_pb_line_break_holder] -->  \"@type\": \"VideoObject\",<!-- [et_pb_line_break_holder] -->  \"name\": \"Protection Against Ransomware: Tips from PTP\",<!-- [et_pb_line_break_holder] -->  \"description\": \"In this cybersecurity webinar, PTP experts and industry partners from Carbonite and Fluency discuss real-world ransomware threats and proven strategies to protect life sciences organizations. Learn how modern ransomware works, how to build a response plan, and what tools can reduce risk across research IT infrastructure.\",<!-- [et_pb_line_break_holder] -->  \"thumbnailUrl\": \"https:\/\/i.ytimg.com\/vi\/KdPetqNLg7s\/maxresdefault.jpg\",<!-- [et_pb_line_break_holder] -->  \"uploadDate\": \"2023-04-06T00:00:00-05:00\",<!-- [et_pb_line_break_holder] -->  \"duration\": \"PT54M44S\",<!-- [et_pb_line_break_holder] -->  \"embedUrl\": \"https:\/\/www.youtube-nocookie.com\/embed\/KdPetqNLg7s\",<!-- [et_pb_line_break_holder] -->  \"contentUrl\": \"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/\",<!-- [et_pb_line_break_holder] -->  \"publisher\": {<!-- [et_pb_line_break_holder] -->    \"@type\": \"Organization\",<!-- [et_pb_line_break_holder] -->    \"name\": \"PTP\",<!-- [et_pb_line_break_holder] -->    \"logo\": {<!-- [et_pb_line_break_holder] -->      \"@type\": \"ImageObject\",<!-- [et_pb_line_break_holder] -->      \"url\": \"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/12\/ptp-logo.svg\"<!-- [et_pb_line_break_holder] -->    }<!-- [et_pb_line_break_holder] -->  },<!-- [et_pb_line_break_holder] -->  \"creator\": {<!-- [et_pb_line_break_holder] -->    \"@type\": \"Organization\",<!-- [et_pb_line_break_holder] -->    \"name\": \"PTP\"<!-- [et_pb_line_break_holder] -->  },<!-- [et_pb_line_break_holder] -->  \"interactionStatistic\": {<!-- [et_pb_line_break_holder] -->    \"@type\": \"InteractionCounter\",<!-- [et_pb_line_break_holder] -->    \"interactionType\": {<!-- [et_pb_line_break_holder] -->      \"@type\": \"WatchAction\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    \"userInteractionCount\": 100<!-- [et_pb_line_break_holder] -->  },<!-- [et_pb_line_break_holder] -->  \"potentialAction\": {<!-- [et_pb_line_break_holder] -->    \"@type\": \"WatchAction\",<!-- [et_pb_line_break_holder] -->    \"target\": \"https:\/\/www.youtube.com\/watch?v=KdPetqNLg7s\"<!-- [et_pb_line_break_holder] -->  },<!-- [et_pb_line_break_holder] -->  \"inLanguage\": \"en\",<!-- [et_pb_line_break_holder] -->  \"isFamilyFriendly\": true,<!-- [et_pb_line_break_holder] -->  \"genre\": \"Cybersecurity, ransomware, life sciences IT, biotech MSP\",<!-- [et_pb_line_break_holder] -->  \"about\": [<!-- [et_pb_line_break_holder] -->    \"ransomware protection\",<!-- [et_pb_line_break_holder] -->    \"incident response plan\",<!-- [et_pb_line_break_holder] -->    \"cybersecurity for life sciences\",<!-- [et_pb_line_break_holder] -->    \"data backup strategies\",<!-- [et_pb_line_break_holder] -->    \"EDR and DNS security\",<!-- [et_pb_line_break_holder] -->    \"security operations\",<!-- [et_pb_line_break_holder] -->    \"cloud security for biotech\"<!-- [et_pb_line_break_holder] -->  ],<!-- [et_pb_line_break_holder] -->  \"keywords\": \"biotech IT support, IT provider for life sciences companies, managed IT for research labs, secure lab IT support, research data IT services, HIPAA-compliant MSP for biotech, MSP services for lab compliance, IT infrastructure for biotech startups, cybersecurity for life sciences, ransomware protection, endpoint detection and response, DNS filtering, managed IT services for labs, incident response planning, scientific computing IT support, research IT support services, GxP-compliant MSP, biotech MSP services\",<!-- [et_pb_line_break_holder] -->  \"transcript\": \"In this expert-led cybersecurity panel hosted by PTP, speakers from Carbonite, Fluency, and PTP share strategies for defending against modern ransomware threats. The discussion explores new ransomware variants like Ryuk and LockBit 3.0, ransomware-as-a-service trends, and the increasing impact on life sciences and biotech organizations. The panel emphasizes that hope is not a strategy\u2014organizations need a formal plan guided by frameworks like NIST 800-53. Key takeaways include establishing an incident response plan, implementing offsite immutable backups, deploying EDR and DNS filtering, monitoring cloud control planes, and training end users. Participants outline the role of managed service providers (MSPs) in maintaining compliance with HIPAA and GxP, conducting vulnerability scans and pen testing, and detecting abnormal behavior across hybrid IT environments. The panelists stress the importance of adapting response plans as cloud tools evolve and scaling with professional help to secure complex research data environments.\"<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><\/script><!-- [et_pb_line_break_holder] -->\u00a0<\/p>\n<div style=\"background-color: #f6f6f6; padding: 2em; border-radius: 8px; margin-top: 2em;\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<h3>Highlights from the Panel Discussion<\/h3>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<ul><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>[0:58] Hope is not a strategy<\/strong> \u2013 The panel emphasized that organizations need an actionable ransomware response plan tailored to their specific risk, not vague assurances.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>[7:00] Ransomware variants evolving<\/strong> \u2013 Kirby Kaylor outlined how newer variants like Ryuk are patient, silently encrypting backups and triggering attacks only when recovery options are gone.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>[13:01] Ransomware-as-a-Service (RaaS)<\/strong> \u2013 Anyone, even without coding skills, can now purchase ransomware templates online and customize attacks for as little as $6.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>[14:25] Shocking statistics<\/strong> \u2013 In the past two years, average ransomware downtime was 16.2 days, and the average ransom paid was $84,000.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>[21:07] Step 1: Use a framework<\/strong> \u2013 Rick Pitcairn recommended using a cybersecurity framework like NIST to structure your response and ongoing risk management.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>[25:11] Step 2: Inventory your data<\/strong> \u2013 Chris Jordan urged organizations to first understand where all data resides across cloud, endpoints, and on-prem systems.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>[27:00] Behavior-based detection is critical<\/strong> \u2013 Prevention alone is not enough. Listening to audit trails and identifying behavioral anomalies is now essential for threat detection.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>[32:23] Step 3: Robust backups<\/strong> \u2013 Kirby shared the 6 key ingredients for effective backup strategy: Automatic, Off-site, Immutable, Granular, Point-in-Time, and Flexible.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>[40:11] The plan must evolve<\/strong> \u2013 Adam Johnson reminded attendees that cybersecurity plans are living documents. As the environment changes, so should your response strategy.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>[43:38] Unified monitoring at scale<\/strong> \u2013 Chris emphasized the need for behavioral models, not just search-based analysis, to manage massive, distributed data from cloud and on-prem environments.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>[50:58] Final steps: End-user training &#038; vulnerability scanning<\/strong> \u2013 Rick wrapped up with the importance of regular phishing simulations, security awareness training, and penetration testing.<\/li>\n<p><!-- [et_pb_line_break_holder] -->  <\/ul>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p><!-- [et_pb_line_break_holder] -->[\/et_pb_code][et_pb_divider _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;39px||-9px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f2f2f2&#8243; custom_margin=&#8221;27px|auto||auto||&#8221; custom_padding=&#8221;18px|18px|18px|18px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p data-start=\"359\" data-end=\"580\"><strong data-start=\"2912\" data-end=\"2965\">Strengthen your defenses against emerging threats<\/strong><br data-start=\"2965\" data-end=\"2968\" \/>Request a 50% off security assessment to evaluate your risk posture and harden your environment or enhance your cybersecurity with our comprehensive SecOps services. Visit our <a href=\"https:\/\/ptp.cloud\/services\/secops\/\" target=\"_new\" rel=\"noreferrer noopener\">SecOps page<\/a> for more information.<\/p>\n[\/et_pb_text][dsm_button button_one_text=&#8221;\ud83d\udc49 Claim your 50% off security assessment&#8221; button_one_url=&#8221;https:\/\/ptp.cloud\/services\/secops\/security-risk-assessment\/&#8221; button_two_text=&#8221;\ud83d\udc49 PTP&#8217;s AWS Marketplace Offers&#8221; button_two_url=&#8221;https:\/\/aws.amazon.com\/marketplace\/seller-profile?id=40aef862-90e2-4a5f-9d98-2ef74b6cbf15&#8243; button_alignment=&#8221;left&#8221; separator_text=&#8221;or explore&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;14px&#8221; button_one_text_color=&#8221;#ffffff&#8221; button_one_bg_color=&#8221;#0eabf4&#8243; button_one_border_width=&#8221;0px&#8221; button_one_border_radius=&#8221;3px&#8221; button_one_font=&#8221;|600|||||||&#8221; button_one_use_icon=&#8221;off&#8221; button_one_custom_margin=&#8221;|11px|||false|false&#8221; custom_button_two=&#8221;on&#8221; button_two_text_size=&#8221;14px&#8221; button_two_text_color=&#8221;#ffffff&#8221; button_two_bg_color=&#8221;#0eabf4&#8243; button_two_border_width=&#8221;0px&#8221; button_two_border_radius=&#8221;3px&#8221; button_two_font=&#8221;|600|||||||&#8221; button_two_use_icon=&#8221;off&#8221; custom_margin=&#8221;|||0px|false|false&#8221; box_shadow_style_button_one=&#8221;preset2&#8243; box_shadow_style_button_two=&#8221;preset2&#8243; box_shadow_blur_button_two=&#8221;19px&#8221; global_colors_info=&#8221;{}&#8221;][\/dsm_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Discover 5 expert-backed ways to protect biotech and life sciences organizations from ransomware. Learn how compliant IT services support data security and continuity.<\/p>\n","protected":false},"author":2,"featured_media":10776,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"The threat of ransomware persists. \u00a0As outlined in the <a href=\"https:\/\/intel471.com\">Intel 471<\/a> Year in Review paper, the the USA is by far the most targeted country in the world facing 39% of total attacks. \u00a0In comparison, the UK comes in at a distant second at 9%. \u00a0Additionally, new variants are on the rise, with LockBit 2.0 and LockBit 3.0 commanding the most attacks last year.\r\n\r\nThe story sounds redundant, but the threat remains. \u00a0Instead of panicking or purchasing unnecessary high-cost security protection tools, the expert security team at PTP has five key recommendations to follow to drastically reduce your risk of business disruption due to ransomware.\r\n\r\n<strong>1. Patch. \u00a0Everything. \u00a0<\/strong>Create a Vulnerability Management process and take the results seriously. \u00a0That fancy light controller for the office, yep, it can be hacked. \u00a0That Windows 2008 server could cost you your business. \u00a0That FedEx printing computer in the office supply room is connected to the network. \u00a0Bad actors are looking for the easiest way into your environment, and those unpatched, easily compromised devices connected to the network are just that.\r\n\r\n<strong>2. Backups. \u00a0<\/strong>Ensure that functional, off-site backups exist following the 3-2-1 rule. \u00a0PTP works with several backup technology providers to deliver backup services as an MSP and are a Veeam VCSP. \u00a0Our colleagues at Veeam offer this explanation on the <a href=\"https:\/\/www.veeam.com\/blog\/321-backup-rule.html\">3-2-1 Backup Rule<\/a>.\r\n\r\n<strong>3. Business Impact Analysis. \u00a0<\/strong>Perform\u00a0a business impact analysis with the business owners and the C suite. Understand what is important to the business and what can afford to be lost if needed. \u00a0If part of a NIST 800-53 Self-Assessment, this would be the \"Identify\" area of focus.\r\n\r\n<strong>4. Incident Response Plan. \u00a0<\/strong>Verify that\u00a0an incident response plan exists, is accessible to key team members offline, and includes the scenario of complete loss of IT functions and networking. You may be asking, \"but why, everything is in the cloud?\" Cloud and massive service outages happen. What if the company was locked out of O365\/Azure AD or Okta?\r\n\r\n<strong>5. EDR & DNS. \u00a0<\/strong>Install and maintain an EDR and one other layer of protection like <a href=\"https:\/\/ptp.cloud\/dns-security-cisco-umbrella\/\">DNS filtering<\/a> or egress traffic control. \u00a0The DNS filtering keeps your employees from getting to known malicious URLs, while the EDR is the last line of defense to identify, block and\/or quarantine malware.\r\n\r\n<em>Rich Hauke, CISSP & Gary Derheim<\/em>\r\n\r\n\u00a0\r\n<h3>On-Demand Webinar: PTP\/Carbonite\/Fluency - Crafting a Plan to Combat Ransomware<\/h3>\r\n<em>Original Webinar hosted 8\/18\/2021<\/em>\r\n\r\n[embed]https:\/\/youtu.be\/KdPetqNLg7s[\/embed]","_et_gb_content_width":"","content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[23,10,15],"tags":[93],"table_tags":[],"class_list":["post-6547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aws-archive","category-secops-archive","category-webinars-archive","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Protection for Life Sciences<\/title>\n<meta name=\"description\" content=\"Protect biotech data with 5 expert tips. Learn how life sciences IT services reduce ransomware risk and improve research security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Protection for Life Sciences\" \/>\n<meta property=\"og:description\" content=\"Protect biotech data with 5 expert tips. Learn how life sciences IT services reduce ransomware risk and improve research security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/\" \/>\n<meta property=\"og:site_name\" content=\"PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PTPCloud\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-08T16:48:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-22T00:00:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/02\/crafting-a-plan-to-combat-ransomware-ptp-panel-discussion.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1545\" \/>\n\t<meta property=\"og:image:height\" content=\"969\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gary Derheim\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:site\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gary Derheim\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/\"},\"author\":{\"name\":\"Gary Derheim\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab\"},\"headline\":\"5 Proven Ransomware Protection Strategies for Life Sciences and Biotech\",\"datePublished\":\"2023-02-08T16:48:57+00:00\",\"dateModified\":\"2025-07-22T00:00:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/\"},\"wordCount\":1179,\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/02\/crafting-a-plan-to-combat-ransomware-ptp-panel-discussion.jpg\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"AWS\",\"SecOps\",\"Webinars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/\",\"url\":\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/\",\"name\":\"Ransomware Protection for Life Sciences\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/02\/crafting-a-plan-to-combat-ransomware-ptp-panel-discussion.jpg\",\"datePublished\":\"2023-02-08T16:48:57+00:00\",\"dateModified\":\"2025-07-22T00:00:49+00:00\",\"description\":\"Protect biotech data with 5 expert tips. Learn how life sciences IT services reduce ransomware risk and improve research security.\",\"breadcrumb\":{\"@id\":\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#primaryimage\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/02\/crafting-a-plan-to-combat-ransomware-ptp-panel-discussion.jpg\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/02\/crafting-a-plan-to-combat-ransomware-ptp-panel-discussion.jpg\",\"width\":1545,\"height\":969,\"caption\":\"Strengthen Your Defenses: Top 5 Strategies to Combat Ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ptp.cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Proven Ransomware Protection Strategies for Life Sciences and Biotech\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ptp.cloud\/#website\",\"url\":\"https:\/\/ptp.cloud\/\",\"name\":\"PTP | Cloud Experts | Biotech Enablers\",\"description\":\"Helping innovative life sciences companies to get treatments to market faster.\",\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ptp.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ptp.cloud\/#organization\",\"name\":\"Pinnacle Technology Partners\",\"alternateName\":\"PTP\",\"url\":\"https:\/\/ptp.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"width\":409,\"height\":181,\"caption\":\"Pinnacle Technology Partners\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PTPCloud\",\"https:\/\/x.com\/PTPCloud\",\"https:\/\/www.linkedin.com\/company\/pinnacletechpartners\",\"https:\/\/www.youtube.com\/@ptp4766\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab\",\"name\":\"Gary Derheim\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Protection for Life Sciences","description":"Protect biotech data with 5 expert tips. Learn how life sciences IT services reduce ransomware risk and improve research security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Protection for Life Sciences","og_description":"Protect biotech data with 5 expert tips. Learn how life sciences IT services reduce ransomware risk and improve research security.","og_url":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/","og_site_name":"PTP | Cloud Experts | Biotech Enablers","article_publisher":"https:\/\/www.facebook.com\/PTPCloud","article_published_time":"2023-02-08T16:48:57+00:00","article_modified_time":"2025-07-22T00:00:49+00:00","og_image":[{"width":1545,"height":969,"url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/02\/crafting-a-plan-to-combat-ransomware-ptp-panel-discussion.jpg","type":"image\/jpeg"}],"author":"Gary Derheim","twitter_card":"summary_large_image","twitter_creator":"@PTPCloud","twitter_site":"@PTPCloud","twitter_misc":{"Written by":"Gary Derheim","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#article","isPartOf":{"@id":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/"},"author":{"name":"Gary Derheim","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab"},"headline":"5 Proven Ransomware Protection Strategies for Life Sciences and Biotech","datePublished":"2023-02-08T16:48:57+00:00","dateModified":"2025-07-22T00:00:49+00:00","mainEntityOfPage":{"@id":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/"},"wordCount":1179,"publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"image":{"@id":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/02\/crafting-a-plan-to-combat-ransomware-ptp-panel-discussion.jpg","keywords":["ransomware"],"articleSection":["AWS","SecOps","Webinars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/","url":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/","name":"Ransomware Protection for Life Sciences","isPartOf":{"@id":"https:\/\/ptp.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#primaryimage"},"image":{"@id":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/02\/crafting-a-plan-to-combat-ransomware-ptp-panel-discussion.jpg","datePublished":"2023-02-08T16:48:57+00:00","dateModified":"2025-07-22T00:00:49+00:00","description":"Protect biotech data with 5 expert tips. Learn how life sciences IT services reduce ransomware risk and improve research security.","breadcrumb":{"@id":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ptp.cloud\/protection-against-ransomware-tips\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#primaryimage","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/02\/crafting-a-plan-to-combat-ransomware-ptp-panel-discussion.jpg","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/02\/crafting-a-plan-to-combat-ransomware-ptp-panel-discussion.jpg","width":1545,"height":969,"caption":"Strengthen Your Defenses: Top 5 Strategies to Combat Ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/ptp.cloud\/protection-against-ransomware-tips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ptp.cloud\/"},{"@type":"ListItem","position":2,"name":"5 Proven Ransomware Protection Strategies for Life Sciences and Biotech"}]},{"@type":"WebSite","@id":"https:\/\/ptp.cloud\/#website","url":"https:\/\/ptp.cloud\/","name":"PTP | Cloud Experts | Biotech Enablers","description":"Helping innovative life sciences companies to get treatments to market faster.","publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ptp.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ptp.cloud\/#organization","name":"Pinnacle Technology Partners","alternateName":"PTP","url":"https:\/\/ptp.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","width":409,"height":181,"caption":"Pinnacle Technology Partners"},"image":{"@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PTPCloud","https:\/\/x.com\/PTPCloud","https:\/\/www.linkedin.com\/company\/pinnacletechpartners","https:\/\/www.youtube.com\/@ptp4766"]},{"@type":"Person","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab","name":"Gary Derheim"}]}},"jetpack_featured_media_url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2023\/02\/crafting-a-plan-to-combat-ransomware-ptp-panel-discussion.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/6547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/comments?post=6547"}],"version-history":[{"count":11,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/6547\/revisions"}],"predecessor-version":[{"id":17828,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/6547\/revisions\/17828"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media\/10776"}],"wp:attachment":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media?parent=6547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/categories?post=6547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/tags?post=6547"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/table_tags?post=6547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}