Hello experts,
Does anyone have advice on which, if any, results from the SQL Server Vulnerability Assessment can be used to identify and remediate ransomware risk?
Thanks for any help.
-- webrunner
-------------------
A SQL query walks into a bar and sees two tables. He walks up to them and asks, "Can I join you?"
Ref.: http://tkyte.blogspot.com/2009/02/sql-joke.html
I think the first step would be to understand how most ransomware infects a system.
I'm not sure I've seen a documented case where the entry point for ransomware was a database server. They are typically introduced into a system through a web site or malicious email, although the bad guys come up with something different my the minute.
Looking at all of the various things the vulnerability scan looks at, there are few, if any, things that would specifically prevent a ransomware attack.
In other words, preventing an attack is far more complex than anything this tool can do.
There are a number of "ransomware simulators" that you can leverage.
Michael L John
If you assassinate a DBA, would you pull a trigger?
To properly post on a forum:
http://www.sqlservercentral.com/articles/61537/
November 22, 2021 at 9:19 pm
Many thanks, Michael. You've provided the info I needed.
-- webrunner
-------------------
A SQL query walks into a bar and sees two tables. He walks up to them and asks, "Can I join you?"
Ref.: http://tkyte.blogspot.com/2009/02/sql-joke.html
Viewing 3 posts - 1 through 2 (of 2 total)
You must be logged in to reply to this topic. Login to reply