Cisco News

7 Questions about the Firewall: A Chat with Cisco featuring Gartner

The firewall remains the front line of cyber-defense for most organizations. The firewall protects an organization’s network, and that function isn’t going away anytime soon. Remember when people used to say, “the firewall is dead”? The numbers tell a different story. Gartner forecasts that this
/
MIT tech review

Five reasons “hacking back” is a recipe for cybersecurity chaos

A new US bill would make it legal for private companies to chase hackers across the internet. It’s a terrible idea that simply will not die. Sometimes when tech policymakers try to solve a problem, their proposed cure would only make matters much worse. That’s
/

The Importance of Cloud Backups

Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past several years that have fallen victim to data breaches and lived to survive:

  • Premera Blue Cross had 11 million member’s names, birthdates, email addresses, addresses, telephone numbers, Social Security numbers, member identification numbers, bank account information and medical claims information compromised in 2014.
  • Sony had 47,000 current and former employee’s names, addresses, Social Security numbers, internal emails and other personal information exposed in 2014.
  • Staples had 1.16 million customer’s credit card numbers from 115 stores stolen.
  • Home Depot had 56 million customer’s credit card numbers stolen.
  • LinkedIn had passwords for nearly 6.5 million user accounts taken by Russian cybercriminals in 2012 which resurfaced in May 2016.
  • Worse yet, in 2013, the U.S. Army, Department of Energy, Department of Health and Human Services had their databases breached which included personal information on at least 104,000 employees, contractors, family members and others associated with the Department of Energy, along with information on almost 2,0000 bank accounts.

At the risk of sounding like misery loves company, you are clearly not alone and anyone is susceptible to a breach in data security. In fact, a survey conducted by security consultancy company CyberEdge found that 71% of those surveyed fell victim to a cyber attack in 2014 and 52% believed they would be hit by a successful cyber attack in the near future. Another online backup survey found that 56% of SMBs store mission-critical data both on-premise and in the cloud, identifying that extra precautions are common practice.

security-insider

While malware comes in different forms of destruction, Ramsonware is one of the newest ploys to handicap the systems of cyber victims. “’Ransomware’ is malicious software that allows a hacker to access an individual or company’s computers, encrypt sensitive data and then demand some form of payment to decrypt it. Doing so essentially lets hackers hold user data or a system hostage,” reports Security Magazine.

Cybercriminals could seek to exploit weak or ignored corporate security policies established to protect cloud services. Home to an increasing amount of business confidential information, such services, if exploited, could compromise organizational business strategy, company portfolio strategies, next-generation innovations, financials, acquisition and divestiture plans, employee data and other data.”

So how do you backup your cloud so that you can recover data without falling victim to Ransomware? Many cloud platforms BDR (backup and disaster recovery) services allow you to schedule backup frequency and replicate data off-site to reduce the possibilities of losing valuable information due to a Ransomware attack, natural disaster or other cause which prevents you from accessing your cloud. For example, if you use Microsoft Azure, they offer Azure Site Recovery which can replicate workloads to the company’s Premium Storage tier of cloud storage which uses SSDs packed with flash chips to speed up cloud applications and associated storage operations. “If you are running I/O [input/output] intensive enterprise workloads on-premises, we recommend that you replicate these workloads to Premium Storage,” wrote Poornima Natarajan, a Microsoft Cloud and Enterprise program manager, in a blog post. “At the time of a failover of your on-premises environment to Azure, workloads replicating to Premium storage will come up on Azure virtual machines running on high speed solid state drives (SSDs) and will continue to achieve high-levels of performance, both in terms of throughout and latency.

While it may be a hassle to backup your cloud data, not doing so could be detrimental to your business. From natural disasters to hackers to human error, taking the time to secure your cloud-based data may cost you a few minutes but could end up being priceless.

By Alex Miller

Alex Miller

Alex Miller is a Senior Analyst at Clutch, a ratings and reviews firm identifies leading software and professional services firms, where he heads the cloud research segments at Clutch. He is a graduate of the George Washington University.

View Website
How Brands Can Use IoT and Wearables to Enhance Customer Experience

How Brands Can Use IoT and Wearables to Enhance Customer Experience

Using IoT and Wearables as Part of the Customer Experience The IoT and wearables are on the verge of completely ...
Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, ...
How Blockchain Has Unexpectedly Improved Big Data Integrity

How Blockchain Has Unexpectedly Improved Big Data Integrity

Big Data Integrity Blockchain technology was developed to improve the integrity of bitcoin. However, as bitcoin became more popular, its ...
IoT and the Evolution of the Workplace

IoT and the Evolution of the Workplace

IoT Evolution Just as the Industrial Revolution changed the relationship between humans and work, the rise of the Internet of ...
MIT tech review

A new deepfake detection tool should keep world leaders safe—for now

/
Donald Trump, Elizabeth Warren, and other presidential hopefuls will be protected against AI doppelgängers thanks to a technique that looks at how they move. An AI-produced video could show Donald ...
Teradata

AI for Industrials: Why is it different?

/
A few weeks ago I wrote a myth-busting post to tell the truth about using AI in industrial settings. But why is this coming up? What is different about industrial situations, and ...
Facebook

Facebook reveals Libra cryptocurrency, with lofty goals

/
SAN FRANCISCO/NEW YORK (Reuters) - Facebook Inc revealed plans on Tuesday to launch a cryptocurrency called Libra, the latest development in its effort to expand beyond social networking and move ...