July 25, 2019

Please reload

Recent Posts

I'm busy working on my blog posts. Watch this space!

Please reload

Featured Posts


February 12, 2018

 Early on, the internet was considered a way to communicate and share ideas, and well-intentioned people used it as such.  However, it wasn't long before unethical people began exploiting how free and open the internet was, and how trusting people can be.  Fast forward to today, and you hear about millions of credit card numbers stolen from Fortune 500 businesses and mom and pop shops' data being held ransom.  however, there are tried-and-true methods to avoid downtime associated with cyber attacks.  We recommend a three-pronged approach comprising of training, security technologies, and data backup. 



Most of the time, the weakest link inside an organization is the employees themselves.  The only real way to mitigate this problem is to educate every one in the company.  Every person should be skeptical of unusual emails or unfamiliar people looking to gain access to the building.  There are procedures in place for a reason.  In the case of ransomware payloads, take some time reading the email to see if it seems suspicious.  Usually, there are some tell-tale signs like misspellings, missing information about the sender, or the terms used are different from what you would assume from the person writing the email.  If you aren't sure, alert your internal IT team.  They can run checks on the validity of the email.  IT is better to be overly caution, and everyone at the organization needs to be vigilant. 



Dishonest people have exploited software and hardware vulnerabilities for a very long time.  The WannaCry epidemic brought to light a Windows vulnerability call DOUBLEPULSAR, where a communication protocol called SAMBA was open to the internet in unpatched Windows environments.  Vulnerabilities like that are not rare; there is a whole industry devoted to plugging those holes with anti-virus software, inbound traffic network requirements, and deep packet inspection, ect.  Be certain that you have the proper security tools in place and keep them updated.



Even if you have a taken the proper security measures, assume that hackers can get through it all, and have a plan in place for recovery.  Each company should understand what to do in case of a breach or data loss.  A business continuity solution that can restore access to servers and data with the quickest recovery time objective (RTO) is key.  For example, file restore is absolutely essential.  Consider taking it a step further and with a solution that can run operations from a backup instance of a virtual server.  These types of products allow businesses to get back online quickly while primary servers are restored.  Companies that don't have a solution in place to get up and running quickly will lose brand brand equity.  Some may even go out of business.  Don't allow your business to become a statistic and get a business continuity solution on site ASAP.  It's hard to know where to start, but focusing on three important aspects to true cybersecurity makes it a little easier to stomach.  The last hole to plug is simply training your organizations employees on how they are soldiers in the fight against cybercrime.  Once all of these have been implemented, you will have taken great strides to greatly reduce the likelihood of having to recover from ransomware. 




Share on Facebook
Share on Twitter
Please reload

Follow Us