Recently the Cyber Security and Infrastructure Security Agency (CISA) in the US, released a notification called “Shields Up”, warning companies to protect themselves from all possible threats to their data. This was due to the increase in ransomware attacks, that in addition to corrupting and stealing data, these attacks can take hundreds of resource hours to recover from.Data Isolation is the solution to this problem, but how do you isolate your data and what does the Cyber Security and Infrastructure Security Agency (CISA) say about it? Data Isolation The threat of ransomware and other cyberattacks places a unique focus on how organisations leverage their backup data. If a ransomware or other attack corrupts production data, organisations need to recover rapidly and accurately to support their 24×7 operational needs. Modern data isolation techniques include immutable snapshots, virtual air gaps, role-based access & multi-factor authentication. A legacy approach is insufficient for the...
Ethos Blog
Updates about the latest Tech News
In the early days of cybercrime, cybercriminals focused on encrypting production data. Cohesity allowed customers to rapidly restore their data from backup. As a result, criminals innovated their attack methods and started directly attacking backups, in order to destroy or encrypt them. Thinking of a way to stop criminals, Cohesity unveiled new SaaS offerings, which are available in the data management-as-a-service portfolio of solutions managed by Cohesity. New SaaS Solutions from Cohesity Cohesity DataGovern: A data security and management service that uses AI/ML to automate the discovery of sensitive data and detect anomalous patterns of access and usage that can predict a cyberattack. Project Fort Knox: A service that allows customers to keep an isolated copy of their data in a vault managed by Cohesity to improve data resilience in the face of ransomware attacks. Learn more about Cohesity's new solutions.
Every year we see unfortunate stories of ransomware attacks where companies lose money, data and potentially reputation. One of the most publicised incidents is the case of the North American oil pipeline, Colonial Pipeline, which caused panic in the purchase of fuel. A ransom of $4.4 million was eventually paid but much of it was recovered by the FBI. We are sure that no organisation wants to go through that. Today we bring you some simple ways to keep your data safe. First, do the basics! Have these essential and indispensable things to avoid losing your data in an attack: two-factor authentication, patch your systems and security monitoring. Always be cautious when clicking links in emails, socially engineered emails & spoofing may make an email look legit. Cybercriminals don't care if you are a big or small company, so always be cautious! Have a Backup! Preferably have a solution that provides...
The health sector produces a lot of data, which guarantees good patient care and helps guide doctors to diagnoses. Therefore, conserving this data is extremely important. On world health day, let's talk a little about the "health" of your data storage and how to use technology in favor of a hospital. Store data on internal hardware or in clouds? Cloud storage is very easy as it accommodates data through a server, unlike the traditional and physical storage system. The information is transmitted and archived on a remote system, and after that, it can be managed, backed up, and made available to the user over a network.When we talk about the security of this data, many questions arise, but with the right provider, you will never have headaches with this kind of concern. Data security is one of the most important benefits of cloud storage.As we mentioned before, having a traditional storage...