Gartner Report Highlights Data Immutability as Key to Ransomware Protection

For anyone questioning the threat that ransomware poses, the recent attacks against Kaseya and Colonial Pipeline are a harsh reminder of why ransomware has become the top cybersecurity threat. Unfortunately, traditional defenses such as anti-malware software and anti-phishing training for employees have often proven ineffective, leading organizations to look for better solutions. In a new Gartner report titled “Innovation Insight for Leveraging Isolated Recovery Environments and Immutable Data Vaults to Protect and Recover From Ransomware,” the analyst firm highlights the critical role data immutability technology can play in ransomware protection.

5 Reasons Ransomware Protection Needs to Be a Board-Level Conversation

It is not just the responsibility of the IT/IS department to keep the business safe, but the obligation of every CXO and Board member to ask for and implement stringent cyber security measures starting with zero trust, perimeter security, and employee training.

Boards need to make ransomware protection a top priority

Ransomware attacks increased 150% last year according to Group-IB, a leading cybersecurity solutions provider, a trend that shows no signs of slowing. Given the financial, operational and reputational risk that ransomware poses, boards of directors need to make sure that safeguarding data from an attack is a top priority for the organizations they oversee. I recently made this case in an open letter to board members in Australia that was published in our only national daily newspaper, The Australian, and is reprinted below.

Overcoming Human Vulnerabilities that Open the Door to Ransomware

Ransomware attacks dominated the cybersecurity landscape in 2020 and will remain a top threat in 2021, posing major challenges for both public and private institutions. The UK’s National Cyber Security Centre recently reported that it handled more than three times as many ransomware incidents as in the previous year. New variations of attacks are always testing security defenses, including more sophisticated “phishing” schemes — taking advantage of human error or vulnerabilities by duping individuals into clicking a malicious link and thereby enabling ransomware to infect an organization.

Ransomware Protection: Immutable Data Storage

Attacks can strike even the best-prepared, making it essential to mitigate the effects of a successful breach. In this webinar, we discuss how the cyber-attacks work and what are the key needs that are crucial to combat these challenges.

MythBusters: Ransomware Protection Edition

This blog addresses the topic of the year and, frankly, one that will be with us for the foreseeable future: ransomware protection. Specifically, we will look at some of the misconceptions and myths regarding ransomware protection solutions and how IT departments around the world are implementing such solutions.

S3 Object Lock — Protecting Data for Ransomware Threats and Compliance

Recently introduced by Amazon S3, Object Lock stores objects using a write-once-read-many (WORM) model.  Cloudian’s HyperStore v7.2 fully supports Object Lock, including all relevant S3 APIs and access control with permissions and bucket and IAM policies.  Application users can now use Amazon SDKs with HyperStore software or appliances deployed in their on-premises infrastructure to protect … Read More