Cyber Attacks

Iron Mountain Introduces Iron Cloud Critical Protection and Recovery to Safeguard High-value Data

Grazed from Iron Mountain

Iron Mountain Incorporated, the global leader in storage and information management services, today announced Iron Mountain Iron Cloud Critical Protection and Recovery (CPR), a managed data protection solution to safeguard and restore critical data, providing confidence in recovery in the event of malicious denial of access attack. Available as part of Iron Mountain's Iron Cloud purpose-built portfolio of cloud-based solutions, Iron Cloud CPR enables organizations to proactively protect vital digital information through secure isolation of their most essential data, providing critical availability of clean data in the event it is jeopardized by a cyberattack. This solution, as part of an enterprise risk containment plan, helps mitigate reputational damage, costs and lost revenue potential from unplanned operational downtime. 

Organizations are applying digital capabilities to processes, products, and assets to improve operational efficiencies, enhance customer value, manage risk, and uncover new revenue opportunities. These digital transformation initiatives generate new types and sources of data increasingly targeted by malicious actors seeking to exploit the unique and highly valuable digital assets found in that data, especially medical and financial records. Today's attacks challenge organizations to find solutions with sufficient protection, full restoration and rapid recovery capabilities to prevent the potential loss of revenue and erosion in brand reputation and company trust. Taken together, these factors have led organizations to a data protection and recovery crossroads, where conventional backup and recovery approaches are insufficient in isolating critical digital assets and enabling restoration following a cyberattack.

How to Keep Customer Data Safe in the Cloud

Article Written by Avery Phillips

Your customers are important to you and your business. Being of significance to you, it would be fitting for you to keep the customer data you obtain out of harm's way. At the same time, you are considering cloud services to accommodate the large capacity of not only customer data but company data as well. So, how do you enjoy the benefits of off-site cloud computing, while keeping your data safe?

Below are some of the biggest threats to data loss, cyber attacks, and otherwise questionable methods of obtaining sensitive data, and what you should watch out for to keep your customer data safe on the cloud.   

Data Breaches

In 2017, we saw very large companies fall victim to massive data breaches, unwittingly releasing sensitive customer data. Equifax, a major credit reporting agency and the hardest hit, revealed information of 143 million US customers. Your business holds very sensitive customer data such as credit card information, social security numbers, and birthdates - all which can be used to turn your customer's loss into a cyber attacker's gain.

Why Maintaining Your Online Security is Vital to Your Business

There is no doubt that threats from cyber attacks are a serious problem for businesses. Companies of all sizes have been the subject of attack, and it can lead to serious problems for customers and clients. Making sure that your companies security is high is important not only to your company as a whole but also for your customer's confidence. Here are some of the ways you can help to maintain the security of your company.

Consider Online Solutions

One way that you can increase your security is to transfer your systems to the cloud. By having all of your data and personal information off-site, you are protected by another level of security. It doesn't just work for your business systems; you can also use it for your servers. Instead of having your own server in the office, you can rent dedicated servers from many companies. It means you can essentially treat it as your own server, although you benefit from expert technical support, flexibility as well as heightened security.

McAfee Integrates Advanced Analytics to Increase Security Operations Center Efficiency and Protect Endpoints and Cloud

Grazed from McAfee

McAfee, one of the world's leading cybersecurity companies, today announced new endpoint and cloud solutions that go beyond machine learning to take advantage of the speed and accuracy of advanced analytics, deep learning and artificial intelligence, and increase efficiency of security operations. Cyber threats and the data needed to defend against them continue to increase, overwhelming security teams and driving the need for open, efficient security operations. McAfee's new solutions make use of the automation, reasoning and data curation uniquely provided by advanced analytics technologies, allowing security teams to easily discover and assess data and root out threats. Through human-machine teaming and an open and interoperable cybersecurity platform, McAfee proves ‘Together is power,' with collaborative security that defends against shared adversaries.

"Security teams are increasingly overwhelmed by the complexity they face in their environments which hinders their ability to defend against the growing number of threats," said Chris Young, CEO of McAfee. "McAfee is acting on our ‘Together is power' principle with collaborative security that combines the unique advantages of people, machines and partners enabling teams to be situationally aware of security events and take swift action to thwart assaults, from the endpoint to the cloud."

FileCloud Unveils 'Breach Intercept' to Safeguard Organizations Against Dramatic Increase in Cyber Attacks

Grazed from FileCloud

FileCloud, the cloud-agnostic EFSS platform, today announced FileCloud Breach Intercept. The newest version of FileCloud offers advanced ransomware protection to help customers handle every phase of a cyberattack: prevention, detection and recovery.

FileCloud is deployed across 90 countries and has more than 100 VARs and Managed Service Providers across the world. Deployed by Fortune 500 and Global 2000 firms, including the world's leading law firms, government organizations, science and research organizations and world-class universities, FileCloud offers a set of unique features that help organizations build effective anti-ransomware strategies.

Global ransomware damage costs are expected to total more than $5 billion dollars in 2017, compared to $325 million dollars in 2015. Ransomware is growing at an estimated yearly rate of 350 percent with business enterprises becoming the priority target for hackers. Enterprise File Sharing and Sync (EFSS) solutions have seen an increase in ransomware attacks with 40 percent of spam emails containing links to ransomware. Whereas public cloud EFSS solutions such as Box and Dropbox offer centralized targets for ransomware attacks, FileCloud's decentralized private cloud reduces your company's exposure to potential attacks.

Data Security Guidance for Small Businesses

With high profile cyber attacks occurring on a regular basis, people who run small businesses are becoming increasingly concerned about their data security processes. For regulated businesses, there is a requirement to provide evidence that the company complies with the minimum requirements. For small businesses that don't have the same level of scrutiny as the larger, highly regulated businesses it can be harder to find support and guidance on responsibilities. 

However, businesses of all sizes must start paying more attention to the threat of cyber attacks, given that the type of businesses that criminals are targeting varies from a small start-up business to a global company that is a household name. Recently we have seen numerous cyber attacks hitting the news headlines, such as payday loan company Wonga who was subjected to an attack, leaving 245,000 customers affected. 

Cloud Computing: Google, Facebook at Center of EU Clash Over Cyber-Attack Law

Grazed from Bloomberg.  Author: Kit Chellel.

Google Inc. and Facebook Inc. are caught in the middle of a clash between European Union lawmakers on whether the U.S. technology giants should be covered by rules forcing companies to report cyber attacks to government agencies in the 28-nation bloc.

While the European Commission wants search engines and social networks included in a revamped law on network and information security, some lawmakers favor a more streamlined approach focusing on critical infrastructure such as banks and power stations...

Cloud Computing: How Secure Is Your Small Business? 5 Tips to Protect Against Modern Cyber Attacks

Grazed from Entrepreneur. Author: John Mason.

Today, technologies like cloud computing, mobility, social, and big data and analytics are enabling small- and midsized businesses (SMBs) to do more with less, reach new markets and focus on creativity and invention instead of IT. But with all this new opportunity comes responsibility. Whether an SMB is moving to the cloud or implementing a bring your own device (BYOD) mobile program, security should be part of the plan.

Each year, cyber crime costs the economy about $445 billion, according to the Center for Strategic and International Studies, and SMBs can be attractive targets for hackers tapping into this profitable black market. SMBs tend to have weaker online security, use cloud services void of strong encryption technology and lack the robust IT and internal policies needed to protect against increasingly sophisticated cyber-crime rings, which operate with an enviable efficiency and effectiveness...

Read more from the source @ http://www.entrepreneur.com/article/246473

Cloud Computing: Palo Alto Networks - Proactively Averting Cyber Attacks

Grazed from SysConMedia.  Author: Charles Hall.

Cyber threats are becoming more advanced, persistent, and focused. The threat landscape is rapidly changing, and evolving faster than ever. Today it is difficult to determine who is winning: either those behind the cyber threats, or those fighting to prevent and remediate the threats. The strategy against cyber threats has been to throw more and more technology at the problem, in an attempt to keep up, and it is not working.

What if there was a way to prevent a cyber attack before it could ever happen? While no solution will prevent 100% of attacks, the goal should be to get as close as possible. Moving to a more proactive solution makes it increasingly difficult for attackers to achieve successful attacks...

Read more from the source @ http://www.sys-con.com/node/3284302

Cloud Computing: The perimeter's breached - encrypt everything!

Grazed from SCMagazine.  Author: Tony Morbin.

Last year's slew of criminal data breaches made it clear that the perimeter has fallen and the privacy of our data is at risk – whether that be passwords and credit cards or celebrity pictures and corporate secrets, while government agencies from China, Russia and the west continue to demonstrate vast intelligence surveillance capabilities.

One of the most effective responses for corporations, governments or individuals is to take a data- centric approach using encryption, potentially making data useless to intruders, or at least, raising the cost of access.  Late last year SC Magazine UK editor in chief Tony Morbin interviewed Alan Kessler, president and CEO, Vormetric, to get an industry view on issues in the commercial encryption market...