Aruna Cisco

2019 Predictions for Innovating, Transforming and Enabling Workplace Transformation

My Predictions for 2019 As we think of the top Collaboration trends for the coming year, we should start by taking a look back at 2018. In 2018, Team collaboration solutions became the norm. More than just an application, it has become the principal interface
/
How cloud-based business management can help an SMB go global

How cloud-based business management can help an SMB go global

Global SMB Business Management Most companies today are familiar with the cloud; using software-as-a-service (SaaS) apps and customer relationship management (CRM) for years. However, many businesses are now running the whole show from the cloud using the opportunity to drive inroads to new markets and
/

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware

The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have been aware of ransomware for almost a decade. Observed instances had been steadily rising, with 3.2 million reported in 2014 and 3.8 million in 2015. But in 2016, the number of instances skyrocketed to 638 million.

The St. Louis public library system became one of the latest high-profile victims when up to 700 of its computers were affected by hackers demanding $35,000 in “ransom” in order to restore access. The initial plan was to refuse to pay and to wipe the computers clean, but a workaround was discovered to thwart the hackers’ plans. Despite this optimistic outcome, library computers remained offline for weeks, severely disrupting operations and services.

As this example illustrates, no organization is immune from these attacks. In fact, a survey of 500 businesses revealed that 50 percent had dealt with ransomware in the preceding 12 months alone. This is the most urgent cyber threat right now, and it’s likely to get worse.

Why Ransomware Is Different

Cyber threats are on the rise across the board, but few have grown as exponentially as ransomware has. Part of the reason is that it’s relatively easy to deliver ransomware and infect large networks. Conducting these attacks is also low-cost, thanks to a wealth of ready-made options on the underground market, and low-risk in terms of enforcement. However, the biggest reason ransomware is so prevalent is simply that it’s profitable.

Unlike other cyberattacks that create disruption or seize control of assets with abstract value, ransomware pays direct dividends for the perpetrators. The overall amount paid out in just the first three months of 2016 totaled $209 million, a figure that was expected to top $1 billion by year’s end. The low-risk, high-reward nature of ransomware essentially guarantees that these attacks will only continue to grow in frequency and severity.

The threat of ransomware demands a response that’s not only urgent, but also strategic. Some of the unique technical features of ransomware allow it to undermine traditional approaches to cybersecurity. As a result, any security infrastructure that does not specifically address ransomware is vulnerable now and likely to be in peril soon.

The Right Approach to Ransomware Threats

Today’s ransomware landscape is such that no one-size-fits-all strategy can sufficiently guard against it. However, the broadest solution available is to rely on cloud- and network-based security and cloud-based storage to back up data and systems.

Cloud- and network-based security pushes threats away from the perimeter of the wide area network, making it much easier to detect, deflect, and destroy ransomware attacks far outside the extended network’s perimeter before they seize control. These security strategies offer a more flexible, agile, adaptive way to update your security protocols. With the features cloud-based security offers, you can edit solutions centrally and gain more visibility into threatening activities.

That’s the first step. Cloud-based storage provides a second layer of protection. While cloud-based security features thwart threats by keeping them outside the borders of your wide area network, if hackers do breach your network’s defenses, using cloud storage neutralizes the negative effects of a ransomware attack. Because you have your whole system backed up, the ploy won’t affect your organization, and you won’t need to worry about paying ransom to criminals.

Cloud-based storage won’t protect your network, but it can be a failsafe, should ransomware take hold of your systems and data. Look at it as cloud-based insurance.

Safeguarding the Future With the Cloud’s Next-Generation Solutions

The cloud is the only platform with the agility to respond to evolutions in ransomware. The purpose of these attacks won’t change, but the delivery methods certainly will. Because cloud environments offer scalable and flexible resources, they allow enterprises to reliably keep up with changes in the threat landscape. Particularly sensitive industries like healthcare, retail, and finance can leverage the cloud by partnering with security providers who offer cutting-edge portfolios of security services.

However, simply adopting cloud-based security and storage is not an adequate response to the threat of ransomware. Your IT team will need to take full advantage of the unique features of the cloud to insulate your organizations’ networks in a meaningful way. And you’ll need to bolster those efforts with an internal campaign to educate all users on the roles they play in helping to keep the network secure.

Here are three ways to implement a multilayered, cloud-based, failsafe approach to your organization’s network security.

1. Leverage advanced security features in the cloud.

Security protections layered over the cloud exceed the capabilities of almost every private enterprise’s infrastructure. They combine sophisticated access controls and advanced encryption technology with expansive capabilities for testing security and vulnerability. Many of these security features also provide necessary levels of protection against distributed denial of service attacks, amplifying their overall utility.

2. Rely on robust disaster-recovery capabilities.

The cloud will always have more reliability and resiliency built in than the average data center. Thanks to expansive storage capabilities and streamlined failover processes, the cloud is becoming the preferred platform for backup recovery. An approach that relies on multiple clouds provides expansive levels of protection without creating huge new costs or unmanageable complexity.

3. Execute expansive user education and training.

Ransomware protection is not complete without addressing the human element. Even cloud-based security is vulnerable unless users understand the threat of ransomware and the risks their personal actions can create. To create a healthy sense of urgency, point out that the cost of cybercrime is expected to reach $2.1 trillion by 2019. Complement that knowledge with education and training to familiarize all users with best practices and updated security guidelines for individuals.

If — or, more likely, when — your systems are hit with ransomware, you will have to select the lesser of two evils: pay the ransom or operate without essential data and IT.

Rather than being forced to make an impossible choice, adopt a preventive strategy as soon as possible. Fortunately, cloud-based security and storage can protect your network from the evolving threats of today and tomorrow.

By Karin Ratchinsky

Karin Ratchinsky

Karin, the director of healthcare vertical strategy at Level 3 Communications, is highly motivated, competitive, and collaborative.

At Level 3 Communications, Karin has been instrumental in accelerating sales, generating and deploying effective market strategies, and growing brand equity within the company’s healthcare vertical ecosystem.

View Website
Future Cybersecurity Challenges (5 Things To Expect)

Future Cybersecurity Challenges (5 Things To Expect)

Future Cybersecurity Challenges Every December, security experts begin to release their predictions on what future cybersecurity challenges will look like in the coming year. “The ...
tech

Live Real Time Hacking and Ransomware Tracking Maps Online

Ransomware Tracking Maps We've recently covered a few real time hacking maps but have decided to extend the list based on the recent ransomware activities with ...
Vibhav Agarwal

Cloud And Cybersecurity: 5 Things CISOs Need To Consider

The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization ...
Infographic - Internet of Things (IoT) Will Be Top Technology Investment

Infographic – Internet of Things (IoT) Will Be Top Technology Investment

Internet of Things Investment Investors are jumping all over the opportunities abound when it comes to the Internet of Things and Big Data. There is simply ...
Rackspace partner

Rackspace’s ObjectRocket Portfolio Offering Expands with Complete MongoDB Licensing

/
SAN ANTONIO – Rackspace’s ObjectRocket portfolio offering has been certified as a worldwide cloud provider of MongoDB, a leading open source general purpose database platform. With this certification, Rackspace has joined a select ...
Google News

Protecting private browsing in Chrome

/
Protecting private browsing Chrome’s Incognito Mode is based on the principle that you should have the choice to browse the web privately. At the end of July, Chrome will remedy ...
NYT

Elon Musk wants to reach your brain

/
An implant that can be inserted into the brain is just some of the technology Elon Musk-backed company Neuralink plans to create. In a first, the company publicly revealed some ...