Ethos Blog

Updates about the latest Tech News

Can You Tell if Your Data Recovery is Predictable

Whether you’ve been hit with a ransomware attack or an internal mishap (malicious or human error), when disaster strikes, it’s critical to quickly recover from data loss. The question is: if a disaster were to happen today, could you predictably recover your backup data—when and where you need it—withouT compromise? The ability to ensure predictable recovery gives you confidence in meeting your SLAs and in the resiliency of your organization. To assess your readiness for achieving predictable recovery, ask yourself these questionS based on a framework of core recovery attributes. 1. Can you meet your predefined backup SLAs?Failed backup jobs and long backup windows that constantly bleed into production time can force compromise. This is because it becomes more convenient to skip the protection of some mission critical data. However, data that is not protected cannot be recovered. If you are unable to complete your backups successfully, how can you meet...

Continue reading
  3354 Hits

How can healthcare keep their data protected?

We've talked here before about frequent attacks on the health area and how important it is to always be aware of data protection, especially in this area (but not only there). Unfortunately, the truth is that many healthcare organizations are not taking all the necessary steps to prevent or deal with ransomware attacks. Today we decided to make this post so that more organizations can take the necessary precautions and learn how modern data protection features can help them to be more resilient before, during and after an attack. How to keep healthcare data safe Some practices are recommended to maintain cyber health security so that we can always stay ahead of the threats that are constantly evolving threatening the privacy and data protection of patients and healthcare professionals.Among the most common methods such as backup and encryption, we have others such as: Restricting access to data and apps We can...

Continue reading
  2393 Hits

Indian airline suffers a ransomware attack

Last week, the SpiceJet airline had to cancel or delay several flights at the last minute due to an attempted ransomware attack. Many customers expressed themselves on social media outlining their disappointment with the company, and after a few hours the reason was disclosed. It was at first unknown if the ransomware resulted in data loss, but on the same day, the company disclosed that it was just an attempted attack that its IT staff had been able to mitigate and allow services to return to normal. Even so, many customers were still disappointed and continued to complain that flights were not normalized and had to wait for up to 80 minutes inside the plane for takeoff with the potential for flights being cancelled entirely. Events like this show us why we must have a robust ransomware protection strategy to prevent attacks and quickly regain control before we lose customers and...

Continue reading
  836 Hits

Cohesity Backup Solutions

Nowadays having data protection together with backup, helps to easily recover them in case something happens, and is indispensable for companies that do not want to suffer attacks on their Infrastructure, which we believe is the case of your company. To prevent attacks, create backups, and keep it safe you need a reliable solution like the one Cohesity offers. What is backup? Backup is the process of duplicating data and storing it in a secure place in case of loss or damage. Ideally, this backup copy (often called a snapshot) is immutable, meaning it cannot be altered after it is created to protect against mutations such as ransomware. We have 3 types of backups: Full backups – The most basic and complete type of backup. As the name implies, this type of backup makes a copy of all data to a storage device, such as a disk or tape. The primary...

Continue reading
  1069 Hits

The Worst Ransomware Attacks in 2021

The year 2021 was marked by worst ransomware attacks, such as the attack on JBS Foods and Colonial Pipeline, causing loss of data and money for the affected companies. We've gathered the worst ransomware attacks of the last year in this post with some tips for your business to avoid this kind of headache. What is a Ransomware Attack? According to the U.S. Government’s Cybersecurity and Infrastructure Assurance Agency (CISA): “Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid.”In general words, it is a type of 'data kidnapping' where criminals act through cybernetic attacks to invade systems and steal such data and ask for money...

Continue reading
  1206 Hits