Who, if anyone, is in charge of multi-cloud business optimization?

Who, if anyone, is in charge of multi-cloud business optimization?

The next BriefingsDirect composable cloud strategies interview explores how changes in business organization and culture demand a new approach to leadership over such functions as hybrid and multi-cloud procurement and optimization. We’ll now hear from an IT industry analyst about the forces reshaping the consumption of hybrid cloud services and
Secure Business Agility

Why Information Security Need to be Empowered to Manage Data Breaches

Manage Data Breaches 2017 saw over 2 dozen major security breaches in 2017.  While the public may have grown numb to the number and constant stream of data breaches reported, outrage has been building around the delays in accompanying disclosures of those breaches and questionable actions
Rise Ransomware

The Rise of Ransomware

Ransomware

IT security company KnowBe4 has issued a warning regarding a new strain of ransomware called VirRansom, which “utilizes both ransomware and parasitic virus features,” according to a statement released Monday, Dec. 8 by CEO Stu Sjouwerman. As a self-replicating program, this particular strain has the potential to lock up a company’s entire system, demanding a BitCoin payment to free the files.

Ransomware is a brazen, yet effective approach to sabotaging a company’s operations by placing all of its files under an encryption key. The organizations behind its deployment often hide their identities within the anonymity of Tor, and demand payment in trackless virtual currency.

The ease by which a ransomware virus can spread has become a troubling problem for IT managers, given the complete interconnectedness of employees, through a variety of personal and company-issued devices as well as across a networks, both internal and cloud-based.

A recent story, covered by NPR, highlighted a company that was presented with a 72-hour countdown clock, which pointed to a deadline at which its files would be encrypted. The business in question was not large – not a typical target for hackers, but was one that found itself at the mercy of extortionists due to a simple human error: a phishing email that resembled a PayPal payment notification appeared in an employee inbox, and once clicked, activated the ransom note and timer.

VirRansom CEO Sjouwerman points out that these types of attacks are very difficult for antivirus companies to keep up with. Quoted in a story at CBS News online, he suggests companies take the following steps to protect themselves in advance:

1. Test the restore function of your backups and make sure it works, and have a full set of backups offsite.

2. Start thinking about asynchronous real-time backups so you can restore files with a few mouse clicks.

3. Get rid of mapped drives and use UNC (universal naming convention) links for shared folders.

4. Look into Whitelisting software that only allows known-good executables to run.

5. Update or enforce security policy best practices, such as thorough security awareness training to prevent these types of infections to begin with because the infection vector is your end-user opening up an attachment or clicking on a link.

Rahul Kashyap, a researcher at the cybersecurity firm Bromium, adds that the programs inside ransomware viruses are getting better at locating high-value files, explaining to NPR that there is greater value in finding autocad files, for example, than regular memos.

Experts are divided as to whether ransoms should be paid, some believing this merely funds more sophisticated crime tools. However all of them agree that the best defence is an offline reproduction of everything a company needs to operate – and that means completely offline.

By Steve Prentice

Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

TOP ARCHIVES

Best Practices in Disaster Recovery and Business Continuity

Best Practices in Disaster Recovery and Business Continuity

Best Practices in Disaster Recovery Hope for the best, prepare for the worst, and expect to be surprised. While that ...
Chatbots vs Virtual Assistants

Chatbots vs Virtual Assistants: What Is The Difference?

Chatbots vs Virtual Assistants If you are running an online service or e-commerce store, chances are you offer automated online ...
The cloud is essential for innovation – but it must be run differently

The cloud is essential for innovation – but it must be run differently

Function as a Service Capabilities The cloud has changed. Ten years ago, it was all about cost. The benefits were ...
What We Can Learn about AI and Creating Smart Products from “The Incredibles”

What We Can Learn about AI and Creating Smart Products from “The Incredibles”

Creating Smart Products from “The Incredibles” Nothing strikes terror into the hearts of humans more than the idea of an ...
Apcela

Why Enterprises Need Communication Hubs for Today’s WAN

Enterprise Communication Hubs As early as 2014, Gartner analysts were touting the benefits of communication hubs as a means to ...