CLOUDTWEAKS CONTRIBUTOR PROGRAM

Join the CloudTweaks thought leadership contributor program which includes a customized profile, branded identity page, newsletter marketing, social amplification and more...

The program is currently available to consultants, influencers or executive level contributors.

Karin Ratchinsky

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware

The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have been aware of ransomware for almost a decade. Observed instances had been steadily rising, with 3.2 million reported in 2014 and 3.8 million in 2015. But in 2016, the number of instances skyrocketed to 638 million.

The St. Louis public library system became one of the latest high-profile victims when up to 700 of its computers were affected by hackers demanding $35,000 in “ransom” in order to restore access. The initial plan was to refuse to pay and to wipe the computers clean, but a workaround was discovered to thwart the hackers’ plans. Despite this optimistic outcome, library computers remained offline for weeks, severely disrupting operations and services.

As this example illustrates, no organization is immune from these attacks. In fact, a survey of 500 businesses revealed that 50 percent had dealt with ransomware in the preceding 12 months alone. This is the most urgent cyber threat right now, and it’s likely to get worse.

Why Ransomware Is Different

Cyber threats are on the rise across the board, but few have grown as exponentially as ransomware has. Part of the reason is that it’s relatively easy to deliver ransomware and infect large networks. Conducting these attacks is also low-cost, thanks to a wealth of ready-made options on the underground market, and low-risk in terms of enforcement. However, the biggest reason ransomware is so prevalent is simply that it’s profitable.

Unlike other cyberattacks that create disruption or seize control of assets with abstract value, ransomware pays direct dividends for the perpetrators. The overall amount paid out in just the first three months of 2016 totaled $209 million, a figure that was expected to top $1 billion by year’s end. The low-risk, high-reward nature of ransomware essentially guarantees that these attacks will only continue to grow in frequency and severity.

The threat of ransomware demands a response that’s not only urgent, but also strategic. Some of the unique technical features of ransomware allow it to undermine traditional approaches to cybersecurity. As a result, any security infrastructure that does not specifically address ransomware is vulnerable now and likely to be in peril soon.

The Right Approach to Ransomware Threats

Today’s ransomware landscape is such that no one-size-fits-all strategy can sufficiently guard against it. However, the broadest solution available is to rely on cloud- and network-based security and cloud-based storage to back up data and systems.

Cloud- and network-based security pushes threats away from the perimeter of the wide area network, making it much easier to detect, deflect, and destroy ransomware attacks far outside the extended network’s perimeter before they seize control. These security strategies offer a more flexible, agile, adaptive way to update your security protocols. With the features cloud-based security offers, you can edit solutions centrally and gain more visibility into threatening activities.

That’s the first step. Cloud-based storage provides a second layer of protection. While cloud-based security features thwart threats by keeping them outside the borders of your wide area network, if hackers do breach your network’s defenses, using cloud storage neutralizes the negative effects of a ransomware attack. Because you have your whole system backed up, the ploy won’t affect your organization, and you won’t need to worry about paying ransom to criminals.

Cloud-based storage won’t protect your network, but it can be a failsafe, should ransomware take hold of your systems and data. Look at it as cloud-based insurance.

Safeguarding the Future With the Cloud’s Next-Generation Solutions

The cloud is the only platform with the agility to respond to evolutions in ransomware. The purpose of these attacks won’t change, but the delivery methods certainly will. Because cloud environments offer scalable and flexible resources, they allow enterprises to reliably keep up with changes in the threat landscape. Particularly sensitive industries like healthcare, retail, and finance can leverage the cloud by partnering with security providers who offer cutting-edge portfolios of security services.

However, simply adopting cloud-based security and storage is not an adequate response to the threat of ransomware. Your IT team will need to take full advantage of the unique features of the cloud to insulate your organizations’ networks in a meaningful way. And you’ll need to bolster those efforts with an internal campaign to educate all users on the roles they play in helping to keep the network secure.

Here are three ways to implement a multilayered, cloud-based, failsafe approach to your organization’s network security.

1. Leverage advanced security features in the cloud.

Security protections layered over the cloud exceed the capabilities of almost every private enterprise’s infrastructure. They combine sophisticated access controls and advanced encryption technology with expansive capabilities for testing security and vulnerability. Many of these security features also provide necessary levels of protection against distributed denial of service attacks, amplifying their overall utility.

2. Rely on robust disaster-recovery capabilities.

The cloud will always have more reliability and resiliency built in than the average data center. Thanks to expansive storage capabilities and streamlined failover processes, the cloud is becoming the preferred platform for backup recovery. An approach that relies on multiple clouds provides expansive levels of protection without creating huge new costs or unmanageable complexity.

3. Execute expansive user education and training.

Ransomware protection is not complete without addressing the human element. Even cloud-based security is vulnerable unless users understand the threat of ransomware and the risks their personal actions can create. To create a healthy sense of urgency, point out that the cost of cybercrime is expected to reach $2.1 trillion by 2019. Complement that knowledge with education and training to familiarize all users with best practices and updated security guidelines for individuals.

If — or, more likely, when — your systems are hit with ransomware, you will have to select the lesser of two evils: pay the ransom or operate without essential data and IT.

Rather than being forced to make an impossible choice, adopt a preventive strategy as soon as possible. Fortunately, cloud-based security and storage can protect your network from the evolving threats of today and tomorrow.

By Karin Ratchinsky

Karin Ratchinsky

Karin, the director of healthcare vertical strategy at Level 3 Communications, is highly motivated, competitive, and collaborative.

At Level 3 Communications, Karin has been instrumental in accelerating sales, generating and deploying effective market strategies, and growing brand equity within the company’s healthcare vertical ecosystem.

View Website
startup tech comic series
The Lighter Side Of The Cloud - 100 Lines
The Lighter Side Of The Cloud - PRISM
The Lighter Side of the Cloud - Procurement
The Lighter Side Of The Cloud - Thunderstorms
Robo-Advisors vs. Financial Advisors: What Do Millennials Prefer?

Robo-Advisors vs. Financial Advisors: What Do Millennials Prefer?

Robo-Advisors vs. Financial Advisors For technology-loving millennials, robo-advisors may seem appealing. With a robo-advisor, a portfolio is managed online by ...
Backups And Disaster Recovery Are Not The Same Thing

Backups And Disaster Recovery Are Not The Same Thing

Backups And Disaster Recovery Most business owners are aware of the consequences of losing data. Much of the value of ...
5 Data Security Tips Small Businesses Should Mimic

5 Data Security Tips Small Businesses Should Mimic

Data Security Tips As more and more companies begin to switch to the cloud, cyber attacks need to be a ...
Infosec thought leaders

Beyond VDI: How the hybrid cloud is forcing us to rethink an industry

Beyond VDI (Virtual Desktop Infrastructure) Before I start this blog, I want to get something off my chest. Here it ...
Google Cloud Platform: Enabling APIs

Google Cloud Platform: Enabling APIs

Enabling Google APIs The Google Cloud Platform is a comprehensive tool that helps companies manage their IT resources. Completing software ...
The Forecast for Industry 4.0: A Combination of Fog and Clouds Resulting in Limitless Opportunities for IIoT Innovation

The Forecast for Industry 4.0: A Combination of Fog and Clouds Resulting in Limitless Opportunities for IIoT Innovation

Limitless Opportunities for IIoT Innovation Manufacturing has transcended its material nature and emerged in a new form that is partially ...
Everyone Has Data, but the Ones Who Can Optimize It Will Be the Winners

Everyone Has Data, but the Ones Who Can Optimize It Will Be the Winners

Big Data Strategies Data is ubiquitous, but success apparently isn’t. Companies using big data strategies are running headlong into an 85 ...
Leading Programming Languages - TIOBE Index for July 2018

Leading Programming Languages – TIOBE Index for July 2018

Last month we announced that TypeScript entered the TIOBE index top 100 for the first time. TypeScript appears to keep growing in popularity. This month it entered the top 50. TypeScript is slowly becoming the new and improved JavaScript. One ...
real time hacking attacks

Live Real Time Hacking and Ransomware Tracking Maps Online

Real Time Hacking Attacks We've recently covered a few real time hacking maps but have decided to extend the list based on the recent ransomware activities with some additional real time hacking attack and ransomware tracking maps. Ransomware refers to malicious ...
Automate Service Management

[Free eBook] 150 Ways to Automate Service Management Throughout Your Organization…

Think about an IT Service Catalog as a supermarket of available services. Everyone in your company requests and delivers services from each other. From Human Resources and Marketing to Facilities and Procurement, each department is a service provider to the ...
Cloud Monitoring and Data Performance Services

Cloud Monitoring and Data Performance Services

CLOUD PERFORMANCE MONITORING The Dynamic State Of Cloud Performance Monitoring And Evaluation Monitoring and evaluation in cloud computing are essential processes. They determine whether a company’s applications on the cloud are effective, safe, and efficient. They also help eliminate failures in ...
Top 50 Cloud Hosting Services

Top 50 Cloud Hosting Services

The methodology behind our top 50 cloud list is based on several years of experience understanding and following who the key players are in the industry. Click to review the current top 50 and stay tuned for future discussion ...
Cloud And Cybersecurity: 5 Things CISOs Need To Consider

Cloud And Cybersecurity: 5 Things CISOs Need To Consider

The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization itself – a conclusion based on my discussions with information security managers and cloud architects ...