Ethos Blog

Updates about the latest Tech News

Know more about Pure Storage Flash Arrays

Pure Storage has solutions for your Datacentre that make it more 'green' (sustainable), secure and modern. Today, we'll cover all the types of Flash Array that Pure Storage offers and decide which one is right for you. First off all, what is an all-flash array? An all-flash array (AFA) is a storage infrastructure that contains only flash memory drives instead of spinning disk drives. All-flash storage is also known as Solid-State Array (SSA). AFAs and SSAs deliver speed, performance, and agility for your business applications. For a long time, Hard Disk dominated Datacentres, but with the SSD boom, many companies started to opt for Flash memories, much faster and more efficient but expensive. Thanks to Moore's law, flash storage has become more cost-effective making all-flash versions of devices viable. Pure Storage deals exclusively with this type of all-flash Array, called the Flash Arrays or All-Flash Arrays. Pure Storage Flash Array Types...

Continue reading
  1359 Hits

New Borat malware could turn into ransomware, DDoS, and spy on PCs

A new malware has been identified as circulating and being sold to hackers, which is more dangerous than it appears. The 'virus' can become a tool for ransomware, DDoS attacks, and spying on computers and systems by recording audio and videos. Know more. A security company has identified this new remote access Trojan called Borat, like the Kazakh character played by comedian Sacha Baron Cohen, as malware that "provides a dashboard for Threat Actors (TAs) to perform RAT activities and also has the option to compile the malware binary to perform DDoS and ransomware attacks on the victim's machine". How does it work? Borat works as a kind of malware toolbox, with several different functions that allow different cybercrimes to be carried out. In this way, the person responsible for the attack can modify, using simple commands, the damage caused by the malware on the victim's computer, as needed. From a...

Continue reading
  934 Hits

What is Ransomware

What could be worse than a hacker breaking into the entire data system of your company and taking everything from you? Certainly a hacker breaking into your data system and asking for a ransom to bring your data back. And in case you don't pay the ransom, you could lose everything. The name of this type of cyber attack is ransomware, and it can be a big problem for you and your business if you don't have adequate protection. How a ransomware attack happens What makes ransomware so difficult to detect is because it is always very ‘masked’. This malware can be installed on your computer via malicious websites, suspicious links via email, or installation of vulnerable apps. Ransomware can also appear in links sent by social networks, wildly used to spread viruses today. Once downloaded and opened, a malicious program installs itself and takes control of your data storage. One...

Continue reading
  1231 Hits

Cohesity Backup Solutions

Nowadays having data protection together with backup, helps to easily recover them in case something happens, and is indispensable for companies that do not want to suffer attacks on their Infrastructure, which we believe is the case of your company. To prevent attacks, create backups, and keep it safe you need a reliable solution like the one Cohesity offers. What is backup? Backup is the process of duplicating data and storing it in a secure place in case of loss or damage. Ideally, this backup copy (often called a snapshot) is immutable, meaning it cannot be altered after it is created to protect against mutations such as ransomware. We have 3 types of backups: Full backups – The most basic and complete type of backup. As the name implies, this type of backup makes a copy of all data to a storage device, such as a disk or tape. The primary...

Continue reading
  1069 Hits

Thousands of Malicious Emails Received by UK Government Officials

A report released in April revealed that UK government officials receive thousands of malicious emails a year. Email is still the most utilized and practical way for criminals to disseminate malicious links and attachments to access company's systems around the world. If you click on one of these links or attachments, your company's data could be stolen and you could be conditioned to pay a ransom for that data back. It is not only large companies and institutions such as government departments that are targeted by these criminals. Always be cautious and instruct your employees to be vigilant. The good news is that in the same way that attacks advance, Cohesity also advances by always being ahead of these criminals to help your company avoid or recover from an attack. Contact us to find out more!

  1087 Hits