Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

How to Improve Mean Time to Detect for Ransomware

Training for multiple situations will help your security team make decisions more quickly

Training for multiple situations will help your security team make decisions more quickly

Moving at digital speed means both good things and bad. Work gets done quickly and efficiently, but when bad guys attack, they too, move at digital speed. That’s why threat detection and incident response have to be nimble and quick. But how are we to know if that is the case? 

Mean time to detect (MTTD), or mean time to detect, is one of the key performance indicators (KPIs) used to measure what information security professionals are trying to do. MTTD measures elapsed time from intrusion to detection, or how long a problem—a vulnerability, an intrusion or some form of malicious activity—is present in the network before the relevant parties in the organization become aware. 

MTTD, sometimes called mean time to identify (MTTI), can be worked out simply by dividing the total of incident response times attributed to a technician, security team or time period by the number of incidents. It is a simple calculation, if the organization has sufficient, accurate data on incidents. 

Challenges to improving MTTD

The ability to bring down MTTD can be limited by a number of factors: 

 Lack of transferable knowledge: The Web is full of commodity malware that bad guys can buy off the shelf and send out as-is, or with minimal tweaking. Knowing how it behaves and some of its indicators can be helpful to security, but not starting with a foundation of knowledge that defenders can then apply to similar situations will slow detection. 

● Lack of experience: Experience in dealing with these incidents is what gives security people the confidence and ability to shorten response times. Once they have dealt with incidents, they will know what to do to apply their learned knowledge. For example, one organization we are familiar with was attacked several times by the same strain of ransomware. The first time, it took upwards of 30 hours to deal with the incident. The second time the malware hit, they were able to use their experience to trim the response to about eight hours—still a whole shift. The third time, it took 15 minutes. 

Advertisement. Scroll to continue reading.

● Lack of process: It doesn’t need to be one analyst working alone against the bad guys. Working as a team brings down MTTD, but teams need a process to follow, and to be comfortable enough with it to work together and resolve incidents. When the team members have had practice working together, they’ll know what to do, who they can count in the team and how to make the handoffs from investigation to mitigation. The work needs to validate their process. 

Best practices for improving MTTD 

The job of security won’t be as tough if teams have the practice and feel a sense of accomplishment as they go through their activities. This creates a ripple effect across the organization as disruptions are reduced. All of a sudden security and IT are not blamed for these disruptions, because as they shorten the response times, those disruptions and outages become less noticeable to the organization. 

Here are a few principles can help bring down those MTTDs: 

● Practice: Don’t wait for a real incident to test your team or to put things into practice, start preparing using live simulations now. You wouldn’t take someone who’s never played football and say: “All right, you’re now the running back. I know you’ve never carried a ball, but we’re putting this all on your shoulders.” Simulations give defenders the exposure and prepares them for incidents. They build a  chain reaction where, if they’re prepared for how things happen in a controlled simulation, they can anticipate how it might happen outside that controlled environment.

● Live in the real world: Understand that the threat landscape changes.  It’s a moving target and we have to be able to think abstractly, to where threats will evolve. That’s where transferable knowledge is important, because something acting up in your environment may be what helps you detect some new threat. Use individual and team exercises to keep up with evolving threat landscape and attack techniques and tactics.

● Invest in training: Make sure staff is trained, knowledgeable and comfortable using the security tools at their disposal. Technology changes and improves, so it’s important to have security staff practicing with and understanding the tools that they’re using. You could have budget for some of the latest and greatest tool sets that are out there, but if your people don’t know how to use them in the context of their job, you won’t get the full benefit from them. 

Nothing can ever prepare an organization for every possible ransomware scenario. However, if you train for multiple situations, your team will be able to make decisions more quickly, and react appropriately when an unforeseen incident occurs. All of which will reduce MTTD.

Written By

Jeff Orloff is Vice President of Products and Technical Services at RangeForce, a cybersecurity training company. He has over ten years of experience in cybersecurity, computer and network security and system administration. Prior to RangeForce, he was Director of Product Management and UX at COFENSE, a company specializing in email security, phishing detection and response. He also served as Technology Coordinator for the Palm Beach County Florida School District.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Ransomware

A SaaS ransomware attack against a company’s Sharepoint Online was done without using a compromised endpoint.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Data Breaches

Sony shares information on the impact of two recent unrelated hacker attacks carried out by known ransomware groups.