…practically every industry vertical as cyber attackers are getting bolder and more sophisticated. The size of the cyber-crime industry is truly breathtaking and only continues to grow. Cybersecurity Ventures expects…
…failure. Usually in these situations security is still OK, and your staff aren’t compromised1. Cyber Recovery And then there’s a cyber recovery situation. What are the likely drivers of this?…
…Vaults? Quite a lot. So why do Cyber Vaults need Recovery Processes? Recovery from a Cyberattack is not a normal process. I’ll use some Australian vernacular here: the sh*t has…
It used to be that topics like cyber resilience were dropped in the IT security bucket. And it’s true that security will always play a part in a robust cyber…
…to contemplate the backup and recovery aspect of the issue. Ransomware, and other forms of cyber-crime, have become such a profitable industry that the cost to the market is increasing…
…the event of a cyber attack. Cyber recovery isn’t disaster recovery. Having an extra copy with different physical access controls is merely the beginning of a cyber recovery strategy, and…
…a reason. If you want cyber-insurance, spend your funds on making sure your data protection process is up to date and functional rather than paying shysters offering “cyber insurance”. So…
…it. Make a Vault part of your Cyber Security Process Of course, there’s no joking about Ransomware and other Cyber attacks, but if your business has put in place a…
…this “humanitarian” approach has been abandoned. Cold-call threats – There have been instances recently where cyber-attackers have cold-called victims if their software has detected evidence of restores being performed. This takes…
…comparison, malicious/criminal breaches are reported based on: Cyber incident Rogue employee/insider threat Social engineering/impersonation Stolen paperwork/data storage devices Cyber incidents are subsequently broken down into: Brute force attacks Hacking Ransomware…