We're getting closer to "something" happening on the hashtag cyberwarfare front. My prediction - backed by the reasoning in this article: First, there will not be a digital Pearl Harbor. Second, russian cyber activity will be focused on unsure, confused responses by hashtag#nato member states that will not have full support from populations, politicians, or governments.
This concludes our 2 part series on explaining the 4 types of backup methods and how they are used and more importantly, how they CANNOT be relied upon as a defence against modern day Ransomware! We all know backups are EXTREMELY important and are an essential part of a well oiled DR strategy. But.. you MUST use the right tool for the job and backups are not a tool to prevent a malware attack that leads to Ransomware.
Backups are for “Normal” Disaster Recovery and NOT designed to defend against Malware! This is Part 1 of our 2 part series on efficacy of backups as a ransomware prevention / recovery tool. Today we dive into Local Online and Network Online and discuss some obstacles / challenges with them from the POV of an attacker hell bent on exfiltrating, corrupting and / or ransoming your organization's data! Attackers next milestone after asserting persistence is to cripple your means to recover the data they plan on encrypting.
Backup and Disaster Recovery Strategies often require a cold war mindset. What does this mean? During the Cold War the USA had to design a strategy which “guaranteed” enough of the country and its people survived to carry on and rebuild post nuclear war. This required a logical selection process which would have divided families. This even included children and spouses of top ranking government officials! So what does this have to do with Backups? I encourage you to read our short article (click the image) and see where the gaps lie and how our innovative technology can save you from having to recover and NEVER have to pay the ransom!
Everyone is investing in tools and strategies to protect their organizations so why are we still being devastated by Ransomware? In the following article we dive in deeper to talk about the tools and their limitations and more importantly how we can help!
In this article, we split up the calculations between downtime and insurance on purpose, because potential downtime risks should feed into the insurance discussion. While of course entire careers are based on the types of calculation involved in insurance pricing, coverage, or protection, we prepared good high level numbers for your risk management planning.
In this article we will be discussing the biggest costs during ransomware attacks - not the ransom! We will look at concrete numbers and ratios to adapt into your risk management budgets and projections and how Cyber Crucible, Inc.' s post attack and preventative technologies' value is revenue and cost aligned. Check it out; I'm seriously considering asking her to write an article walking us through the Excel spreadsheets she used to come up with these numbers for your own use.
In the news
A list of of articles and videos about Cyber Crucible