What is Ransomware

What could be worse than a hacker breaking into the entire data system of your company and taking everything from you? Certainly a hacker breaking into your data system and asking for a ransom to bring your data back. And in case you don't pay the ransom, you could lose everything. The name of this type of cyber attack is ransomware , and it can be a big problem for you and your business if you don't have adequate protection. How a ransomware attack happens What makes ransomware so difficult to detect is because it is always very ‘masked’. This malware can be installed on your computer via malicious websites, suspicious links via email, or installation of vulnerable apps. Ransomware can also appear in links sent by social networks, wildly used to spread viruses today. Once downloaded and opened, a malicious program installs itself and takes control of your data storage....
Continue reading
  112 Hits
112 Hits

What is “Data Isolation”?

Recently the Cyber Security and Infrastructure Security Agency (CISA) in the US, released a notification called “Shields Up”, warning companies to protect themselves from all possible threats to their data. This was due to the increase in ransomware attacks, that in addition to corrupting and stealing data, these attacks can take hundreds of resource hours to recover from. Data Isolation is the solution to this problem, but how do you isolate your data and what does the Cyber Security and Infrastructure Security Agency (CISA) say about it?   Data Isolation The threat of ransomware and other cyberattacks places a unique focus on how organisations leverage their backup data. If a ransomware or other attack corrupts production data, organisations need to recover rapidly and accurately to support their 24×7 operational needs. Modern data isolation techniques include immutable snapshots, virtual air gaps, role-based access & multi-factor authentication. A legacy approach is insufficient for...
Continue reading
  76 Hits
76 Hits

New SaaS Solutions Designed to Address Increasingly Sophisticated Ransomware Attacks

In the early days of cybercrime, cybercriminals focused on encrypting production data. Cohesity allowed customers to rapidly restore their data from backup. As a result, criminals innovated their attack methods and started directly attacking backups, in order to destroy or encrypt them. Thinking of a way to stop criminals, Cohesity unveiled new SaaS offerings, which are available in the data management-as-a-service portfolio of solutions managed by Cohesity. New SaaS Solutions from Cohesity Cohesity DataGovern: A data security and management service that uses AI/ML to automate the discovery of sensitive data and detect anomalous patterns of access and usage that can predict a cyberattack. Project Fort Knox: A service that allows customers to keep an isolated copy of their data in a vault managed by Cohesity to improve data resilience in the face of ransomware attacks. Learn more about Cohesity's new solutions.
  172 Hits
172 Hits

3 ways not to lose your data during a cyberattack

Every year we see unfortunate stories of ransomware attacks where companies lose money, data and potentially reputation. One of the most publicised incidents is the case of the North American oil pipeline, Colonial Pipeline, which caused panic in the purchase of fuel. A ransom of $4.4 million was eventually paid but much of it was recovered by the FBI. We are sure that no organisation wants to go through that. Today we bring you some simple ways to keep your data safe. First, do the basics! Have these essential and indispensable things to avoid losing your data in an attack: two-factor authentication, patch your systems and security monitoring. Always be cautious when clicking links in emails, socially engineered emails & spoofing may make an email look legit. Cybercriminals don't care if you are a big or small company, so always be cautious! Have a Backup! Preferably have a solution that provides...
Continue reading
  163 Hits
163 Hits

How can technology help improve patient experiences

The health sector produces a lot of data, which guarantees good patient care and helps guide doctors to diagnoses. Therefore, conserving this data is extremely important. On world health day, let's talk a little about the "health" of your data storage and how to use technology in favor of a hospital. Store data on internal hardware or in clouds? Cloud storage is very easy as it accommodates data through a server, unlike the traditional and physical storage system. The information is transmitted and archived on a remote system, and after that, it can be managed, backed up, and made available to the user over a network. When we talk about the security of this data, many questions arise, but with the right provider, you will never have headaches with this kind of concern. Data security is one of the most important benefits of cloud storage. As we mentioned before, having a...
Continue reading
  232 Hits
232 Hits