Critical Cloud Security & Ransomware Defense Tips…

Amazing! Critical Cloud Security & Ransomware Defense Tips…

Information about Critical Cloud Security & Ransomware Defense Tips…

Phil Puccio

Regular backups are essential to ensure business continuity in the event of a breach.

Cloud tip # 3: back up and secure your cloud data

Austin wants companies to focus on becoming Ransomware resistant.

Most ransomware attacks are not targeted at individuals, but at easy money.

“It’s like a random car theft,” Austin said. “It’s the people who leave their keys under their visors and their doors unlocked. That’s what we have on the Internet right now: companies that don’t understand what it means to have their cyber doors locked. ”

Some businesses, such as retailers with credit card details, have information that is easy to sell on the black market and the dark web. In these cases, criminals who want to exfiltrate this data have a financial advantage – which is then sold to others.

“Most non-retail companies don’t have a lot of credit card information, or at least not enough of it where the profit model makes sense,” Austin said. “But the bad guys found something out: Just because there isn’t anyone else who is overly interested Her That doesn’t mean data she are not very interested in your data – because without your data you probably cannot run your business, serve your customers or fill your bank accounts. ”

So let’s talk about how companies can review their ransomware defenses and responses and see where Colonial Pipeline went wrong earlier this year.

Cloud tip # 4: check your ransomware defenses

The rupture of the Colonial Pipeline is a story that our readers might care about because without energy sources like gas and oil, construction projects cannot move. So how were they hacked?

They had a Virtual Private Network (VPN), a tool that anonymizes a company’s IP address and makes it difficult for a specific company to bind to a specific IP address. However:

  • Your VPN was old and should have been turned off, but it wasn’t
  • The admin account should have been deactivated, but it wasn’t
  • After all, they have no MFA used

This jumble of factors led to the rupture.

“They didn’t understand internet-based systems or the importance of being more careful with authentication,” said Austin.

Breaking Story – Critical Cloud Security & Ransomware Defense Tips…

The Latest News on Critical Cloud Security & Ransomware Defense Tips…

Original Source:
Category – Construction

© 2021 - WordPress Theme by WPEnjoy