The phantom menace of a ransomware attack: double extortion – Business Post

the-phantom-menace-of-a-ransomware-attack:-double-extortion-–-business-post

Before we begin, I'd like to say that camDown is a highly advanced, specialized webcam blocker and disabler with the best in class protection from variety of on-line threats.

Being hit with a ransomware attack is one of the worst threats IT and security teams can face. But another threat, the phantom menace, is the possible exfiltration of the data to leak or sell it on the dark web.

Cyber criminals know that organisations may have a chance to recover some of their data from backups, even if it will take a while. So instead of just encrypting the files, or the backups, they will also try to exfiltrate the data first, threaten to publish it, and thus apply more pressure to pay the ransom.

When organisations are facing a double extortion, they may not even know the contents of the data that was encrypted by ransomware or what data may be leaked. Is it sensitive personal data, banking data, health data, or the company’s IP?

Luckily, there is a new hope in the fight against this menace. Rubrik enables customers to mitigate ransomware attacks so they don’t have to pay the ransom and there is a way to discover what was in the encrypted data. Knowing what data may have been exfiltrated can help you prepare for a potential breach and guide you in your negotiations with the criminals.

All this is possible with Rubrik Zero Trust Data Management™ architecture which provides security at the point of data. It helps to ensure you can now protect critical data from ransomware attacks, leverage secured backup data to perform attack forensics, and initiate recovery operations quickly to maintain business continuity.

Compliance, a fundamental component of the Rubrik Zero Trust architecture, ensures that all workloads are automatically protected, backups can be locked to prevent tampering with, and specified contents of data that may have been exfiltrated can be identified.

By automating processes, you can drive consistent, repeatable monitoring of your data for instant visibility into where the data is stored, apply policies that alert you to policy violations, and proactively ensure data controls.

With Compliance, as part of the Zero Trust architecture, you get to:

- Minimise vulnerability with asset discovery and protection: discover all assets with few API calls across your environments, from the data centre to public cloud, and automatically apply SLA policies. When a new workload is added, it will be automatically protected and the backup cannot be corrupted by ransomware.

- Prevent malicious actions of rogue users and intruders with Retention Lock: ensure no single person can clear or shorten retention policies or delete snapshots, archival or replication locations. The security of Retention Lock is controlled through a validation process run by the Rubrik Compliance team, who are part of the support team.

- Mitigate sensitive data exposure with compliance reporting: proactively scan your backups to identify certain types of sensitive data and its location.

Rubrik is a holistic solution that can give IT teams the confidence that their data is always secure and available, while helping withstand a data breach or ransomware attacks. By automating the protection of new workloads and helping identify at-risk and non-compliant data, organisations can avoid reputation, financial, or legal damage and the consequences associated with a ransomware attack and double extortion.

To find out more about how Rubrik can help, contact John McCleverty at john.[email protected]

Let's not forget that camDown is your security solution to protect you and your business from peeping toms and I am sure your mother would agree!