We've talked here before about frequent attacks on the health area and how important it is to always be aware of data protection, especially in this area (but not only there). Unfortunately, the truth is that many healthcare organizations are not taking all the necessary steps to prevent or deal with ransomware attacks. Today we decided to make this post so that more organizations can take the necessary precautions and learn how modern data protection features can help them to be more resilient before, during and after an attack. How to keep healthcare data safe Some practices are recommended to maintain cyber health security so that we can always stay ahead of the threats that are constantly evolving threatening the privacy and data protection of patients and healthcare professionals.Among the most common methods such as backup and encryption, we have others such as: Restricting access to data and apps We can...
Ethos Blog
Updates about the latest Tech News
Unfortunately, the global growth of data centres caused a certain environmental impact, which makes us think more about sustainability because the organisations are under pressure to make better choices about the planet. Companies like Google has aggressive goals like not using any more carbon-emitting energy 24/7 until 2030. How are these goals achieved? Reducing the space inside of the data centres and offsetting carbon footprints with renewable energy. To help your company to reduce its carbon footprint and be a sustainable organisation for the world, Pure Storage shared in a post some ways of how they can help. See below: Green Values The power consumption costs green—and lots of it. When it comes to the company’s bottom line, it’s difficult to uncouple money from the drive to “go green.” Whatever the reason that drives executives to make a change for a greener, more sustainable data centre, everyone wins. Increased Performance with...
Did you know that 44% of organisations report having non-planned and inefficient data management? It is true! A study from Everest Group Research showed recently that this is one of the top challenges when we are talking about cloud transformation journeys for companies. It happens when organisations don't have all the necessary support that they need and end up having fragmented systems, which is not a good thing when we speak about data security. Although Cohesity made it possible to change this cycle! Learn 5 ways that Cohesity presented the benefits of digital transformation and how they can help you to accelerate it keeping your data protected, consolidated, repurposed, secured, analysed, governed, and preserved throughout. The GSI-ready platform supports seamless solution integration Cohesity modernises data centre architecture, extends to the cloud, and helps organisations develop for the cloud. The Cohesity flexible, GSI-ready platform is simple at scale, making it easy to...
You've probably heard the term web 3.0 or Data web. Web 3.0 is the evolution of how society deals with the internet and interacts through it, that is, it is a new global trend of behavior connected full-time to the internet. We'll explain more about web 3.0, or data web, in this post and show how it changes the whole way we look at data going forward. First, what came before web 3.0 Just like we have the historical leaps like the French revolution, the modern age, etc. The internet also has its leaps in history and this started in the mid-'80s when it was created. This period is called web 1.0, which relates to the period when websites had static pages and only companies had access to propagate information. This changed a little with the beginning of web 2.0, a leap that was made around the 2000s when we used...
A cyber attack gang called Conti had their files leaked that show what they planned to do with all the money they raised carrying out ransomware attacks on companies. Among the plans were to open a casino and create a new social network. The gang has extorted around 180 million dollars from companies since last year and had their scheme leaked by a cybersecurity researcher who infiltrated a dark web chat and brought up 60000 files of chat messages. The files show more than just the daily functioning of the group, how they carry out attacks, and so on. They also show what they intend to do in the future like cryptocurrency and social media schemes and expansion beyond corporate extortion. We always need to be prepared to protect ourselves from attacks like this gang. Unfortunately, as anti-ransomware systems evolve, they also evolve with their attacks. Choose as your cybersecurity and...