Save time with unbiased, independent feedback on vendor solutions.
Watch weekly bite-sized webinars hosted by IANS Faculty.
Ransomware is an issue affecting organizations in all market verticals. Globally, there is a lack of qualified cybersecurity practitioners, and attackers realize this lack results in systems that are not hardened. Rather than attempting “traditional”
attacks, organized crime groups will implant attack code into victim organizations and indiscriminately encrypt systems and data. The decryption key or keys are then held for ransom. If an organization wants its data back, it must either find a way
to reverse the encryption process, restore systems from backup or pay the extortion demands.
Due to the prevalence of ransomware attacks, organizations all over the world have increased their backup readiness posture. In many instances, this allows well-prepared organizations to avoid paying ransom. In response, forward-thinking attack groups
have shifted tactics. In addition to standard ransomware encryption attacks, these groups are now stealing data and threatening the victim organization with public release of the data if the ransom demands are not met. Because of this, we are seeing
a renewed focus on data protection at rest and in transit.
Defending against this new level of ransomware attack requires a new level of focus on your backup program. Practitioners should consider:
Organizations are rethinking their data lifecycle to minimize the effects of newer data theft extortion methods. Some practices to consider are:
Good backups aren’t enough to counter the latest version of ransomware. To improve your chances of recovering without paying a ransom, consider:
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in
connection with such information, opinions, or advice.
November 30, 2023
By IANS Research
CISOs, find guidance on what to focus on within the first 30 days, 6 months and first year of your tenure to ensure a fast, successful start.
November 28, 2023
Use this checklist of best practices, designed to help CISOs and cybersecurity leaders protect their organizations and avoid SEC compliance missteps.
November 21, 2023
Access key data sets from the 2023 edition of IANS and Artico Search’s Security Organization and Compensation Benchmark Report. Gain valuable insights on functional leadership compensation to hire and retain top security talent.