InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
A strong backup solution will minimize the impact of most – but not all – ransomware attacks. Unfortunately, no matter what industry you are in, backups alone are not enough protection against nation states or other sophisticated attack groups
who steal and threaten the release of your sensitive data. This piece offers several best practices aimed at building a holistic data protection strategy that will help organizations avoid paying a ransom in the event of a ransomware attack.
Defending against this new level of ransomware attack requires a new level of focus on your backup program. Best practices here include:
This is a shift from a more traditional “back it all up” approach. Most organizations are discovering that with modern IT automation tools like Windows Autopilot for physical devices and Terraform or Pulumi for cloud-based systems, the re-provisioning
of any system can be done easily and at scale. In the event of a mass system reset – a common occurrence in ransomware events – this process can be faster than backup-only-based restoration.
Organizations are rethinking their data lifecycle to minimize the effects of newer data theft extortion methods. Some best practices here are:
Good backups aren’t enough to counter the latest flavor of ransomware. To improve your chances of recovering from a ransomware attack without paying, consider
the following tips:
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in
connection with such information, opinions, or advice.
December 2, 2021
By IANS Faculty
As the end of the year approaches, security leaders are starting to plan their strategic and tactical roadmaps for the year ahead. Here is a list of three security initiatives to consider in 2022.
November 30, 2021
The most valuable server and endpoint security metrics for security teams tend to help improve the security program overall. Here is a list of key server and endpoint security metrics to use for reporting.
November 23, 2021
Understand how data lakes differ from SIEMs, and guidance for planning, building, and securing a security data lake.