To overview

With our constant internet usage and plethora of devices, there is more information being generated and shared than ever before. Also, because of the COVID-19 outbreak and majority of the workforce working at home, there are new security vulnerabilities that you need to be mindful of. As a result, the focus of cybercriminals has shifted and security solutions like Antivirus (AV) is no longer enough to be fully prepared against their sophisticated Ransomware attacks.

Now, don’t get me wrong. We are not saying that security solutions are not required; in fact it is and will continue to be an important part of any Ransomware and cyberattack protection strategy, but the security landscape has changed a lot in the last couple of years, and you must implement more than ‘just’ AV to meet the challenges of today’s cyberthreats like Ransomware.Screenshot 2020-05-12 at 5.18.31 PM.png

Today’s security landscape has changed, especially so in the past couple of years.

Customers require a more proactive attack protection to supplement basic AV. Using “just” AV or endpoint security product is like fighting with one arm tied behind your back. Veritas has had its eye on the landscape and added protection technologies that are designed to help protect your critical data in case the worse happens.

In fact, When developing a framework for talking about Ransomware Resiliency, we’ve made the effort to align to language used by the NIST and CISA (Cybersecurity and Infrastructure Security Agency).

But do remember that NO single set of rules will protect every business, but thoughtful CIOs and CSOs take steps like these:

Educate:

Focus on employees training: Make sure your employees know the dangers and what to avoid. By doing this, they will understand the risks of attachments and links in unexpected email, and downloaded software before it is scanned for viruses.

Educate about how file-sharing programs and free downloads may install malicious code automatically. Stop them with training, policies, and software.

Secure:

Close security gaps: Protect network endpoints, not just perimeter. Make sure you analyse network traffic for signatures that match known cyberattacks.

  • Integrate defenses: Combine Detection Systems (IDS), Intrusion Prevention Systems (IPS), AV, and firewall at endpoints – with encryption if they travel.
  • Keep your OS/apps updated: Close vulnerabilities by quickly applying updates from software providers.
  • Update virus definitions: Threats evolve – keep your AV software virus definitions up to date.
  • Strong passwords: Make it mandatory to have strong passwords that mix letters and numbers and have policies in place to change them often.

Protect:

Regular backups: Implement and enforce backup schedules – and automate the process as much as possible.

  • Follow 3-2-1 Rule and keep yours backups offsite: Be sure you can recover your files, systems, and survive loss of your facility, or even a regional disaster.
  • Test your backups regularly: Don’t wait until actual data recovery to discover a technical shortcoming – test the entire backup and recovery cycle.
  • Disaster Preparation Plan (DPP):  Have a DPP return to an operational status as quickly as possible.

Screenshot 2020-05-12 at 5.18.03 PM.png

Better to be safe than sorry!

To protect yourself against cyberattacks, you have to be prepared. That’s why Veritas is offering a SaaS backup solution to protect your Microsoft 365 environment. SaaS Backup protects and recovers your entire Microsoft 365 from your emails, calendars, and contacts to tasks, OneDrive files, SharePoint and Sites and keeps it for as long as you need to–all with a couple of clicks.

Request your trial here or contact us for more information.

 

 

To overview

Reader comments

0 comments

Your email address will not be published. Required fields are marked *