Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 31 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Ransomware encrypting critical systems

Even backups were not safe

by Joel
October 12, 2021
in Malware, Phishing and Ransomware, News
Ransomware
Share on FacebookShare on Twitter

Unfortunately, ransomware is impacting businesses of all sizes across the globe. This means that critical systems and applications are encrypted by malicious actors and will only be decrypted if a ransom is paid. This will effect all but the most prepared enterprises, and as recent reports show, even prepared businesses can suffer. Offline backups of business critical information can be make or break when it comes to mitigating a ransomware attack. However unfortunately, some backups are still vulnerable to encryption. In order to provide an education for companies, the UK‘s National Cyber Security Centre (NCSC) has issued updated guidelines on how to deal with ransomware.

With this in mind, several cybersecurity experts have used their experience in order to help businesses and consumers protect their most precious information:

Chris Clements, Vice President, Solutions Architecture, Cerberus Sentinel

While offline backups are certainly an important part of any business continuity strategy, they provide limited protection to sophisticated ransomware attacks, as many actors delay activation until their code has been deployed in an environment for an extended period of time (often months), allowing for their code to infect even offline backups. Restoring from an offline copy simply re-installs that software into the environment, only to be re-activated.

Martin Jartelius, CSO, Outpost24

This has been something stressed for a long time by security organizations, a backup should be protected against getting overwritten, and offline- offsite backups are a strong recommendation, both to ensure a capability to restore and the integrity of the information.

Similarly, ensuring that the backup system is not granted write-rights to the systems it backs up is equally critical, as otherwise we are back to all eggs in one basket, just having shifted the role from this being the production system to this being the backup system.

Baan Alsinawi, Managing Director, Cerberus Sentinel

Adding one suggested point: Encryption! use encryption for your data backups. use a separate key for your backup data than the primary storage data. especially when using cloud backup solutions. less likely that two passwords/encryption methods be compromised at the same time,reduces your risk for recovery of your data after a ransomware incident. this is a best practice recommendation.

Dave Jemmett, CEO, Cerberus Sentinel

While offline backups are certainly an important part of any business continuity strategy, they provide limited protection to sophisticated ransomware attacks, as many actors delay activation until their code has been deployed in an environment for an extended period of time (often months), allowing for their code to infect even offline backups. Restoring from an offline copy simply re-installs that software into the environment, only to be re-activated.

Good business practice dictates having several backups.  Keeping one from 6 months prior, 3 months prior and the monthly. The monthly backup should be daily snapshots.

The scanning of the servers for threats daily, then back up to multiple locations.  Today’s cloud back up storage is a inexpensive and can be done in several offsite locations. These backups should be verified and restored periodically for validation. Encrypted backups are also a way to prevent the malware from infecting it if it’s connected to the network.

Javvad Malik, Security Awareness Advocate, KnowBe4

Offsite backups are important to prepare for any sort of incident, but are even more important in the case of ransomware. However, even backups alone may not be sufficient. We’re seeing ransomware evolve to the point that the criminals steal critical information from organisations when they infect them with ransomware. They then try to extort the company, its customers, and partners for money in order to not release the stolen information. Therefore, it’s essential that organisation do all they can to prevent ransomware to begin with. This requires a layered approach to make it difficult for criminals to get in such as patching external-facing systems, implementing MFA, encrypting data, and providing security awareness and training to all users.

FacebookTweetLinkedIn
Share2TweetShare
Previous Post

Ransomware victims backups unsafe

Next Post

Gurucul Launches New Unified Security and Risk Analytics Platform

Recent News

JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information