We've talked here before about frequent attacks on the health area and how important it is to always be aware of data protection, especially in this area (but not only there). Unfortunately, the truth is that many healthcare organizations are not taking all the necessary steps to prevent or deal with ransomware attacks. Today we decided to make this post so that more organizations can take the necessary precautions and learn how modern data protection features can help them to be more resilient before, during and after an attack. How to keep healthcare data safe Some practices are recommended to maintain cyber health security so that we can always stay ahead of the threats that are constantly evolving threatening the privacy and data protection of patients and healthcare professionals.Among the most common methods such as backup and encryption, we have others such as: Restricting access to data and apps We can...
Ethos Blog
Updates about the latest Tech News
A cyber attack gang called Conti had their files leaked that show what they planned to do with all the money they raised carrying out ransomware attacks on companies. Among the plans were to open a casino and create a new social network. The gang has extorted around 180 million dollars from companies since last year and had their scheme leaked by a cybersecurity researcher who infiltrated a dark web chat and brought up 60000 files of chat messages. The files show more than just the daily functioning of the group, how they carry out attacks, and so on. They also show what they intend to do in the future like cryptocurrency and social media schemes and expansion beyond corporate extortion. We always need to be prepared to protect ourselves from attacks like this gang. Unfortunately, as anti-ransomware systems evolve, they also evolve with their attacks. Choose as your cybersecurity and...
These days we cannot afford not to be prepared to deal with anything and everything that can happen within our IT structure. With ransomware attacks happening every day, the development of system improvements, updates, etc., we need to have a more agile and easier to deal with IT infrastructure. Many companies are now focused on scaling IT operations using improved and more automated infrastructures, transforming the use of technology, and enabling projects to be delivered faster and more innovatively within the business. For your company to become a leader, you will need to adopt better infrastructures. But how? In this post, we will help you with that. Become a technology-oriented company There are two ways companies deal with new technologies. The first is just buying the technologies without evaluating or planning how to use them. The second is to assess, understand and plan how to use new technology to grow. Companies...
When we talk about ransomware attacks, we soon know that we are talking about a high financial impact on the company in addition to the loss of important data. Ransom payment is not always the only impact we have, as we have already talked about the worst ransomware attacks, it often impacts sales, lack of consumer/user trust, process interruption, etc. All this means losing money and we don't want that. In 2021, the average ransomware payment was over half a million dollars. Along with that increase of about $200,000, insurance companies have increased their rates by 92% as well. So we need solutions that prevent the attack and help us not to be financially impacted by being attacked if that happens. Pure Storage has written 5 tips on how to minimize these costs that we bring today. Back up your data and test your backups frequently. If you've taken an offsite...
The year 2021 was marked by worst ransomware attacks, such as the attack on JBS Foods and Colonial Pipeline, causing loss of data and money for the affected companies. We've gathered the worst ransomware attacks of the last year in this post with some tips for your business to avoid this kind of headache. What is a Ransomware Attack? According to the U.S. Government’s Cybersecurity and Infrastructure Assurance Agency (CISA): “Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid.”In general words, it is a type of 'data kidnapping' where criminals act through cybernetic attacks to invade systems and steal such data and ask for money...