Cyber Attacks

Rubrik Launches Radar, an Intelligent Application to Defend Against Ransomware

Grazed from Rubrik

Rubrik, the Cloud Data Management company, announced the general availability of Polaris Radar, the latest data management application built on the Polaris SaaS platform. Polaris Radar leverages machine learning to model threat behavior, accelerating how enterprises mitigate data security incidents. In the event of an attack, such as ransomware, enterprises can now minimize business disruption and data loss by recovering in just a few clicks across their entire environment.

Ransomware attacks are intensifying in scale and sophistication, and the perpetrators are better at evading countermeasures. A recent NTT Security survey revealed that ransomware attacks rose 350 percent in 2017 over the previous year. According to a survey conducted by endpoint protection provider Barkly, 71 percent of organizations were infected by ransomware after it successfully bypassed their prevention controls. Enterprises must act quickly to contain the risks posed by ransomware in order to minimize cost, recovery time, and reputational damage. A holistic ransomware response strategy integrates accelerated detection and recovery alongside prevention measures, ensuring strong resiliency in the face of cyber threats.

Check Point Introduces Generation V Security Gateway for Enterprises and Data Centers

Grazed from Check Point Software Technologies

Check Point Software Technologies Ltd., a leading provider of cyber security solutions globally, today announced the launch of its new 23900 security gateway, setting a new standard of protection against the most advanced fifth generation of cyber-attacks targeting enterprise and data center networks. Combining comprehensive threat prevention with purpose-built hardware, this latest addition to the Check Point 23000 family delivers the power to inspect SSL-encrypted traffic without compromising on performance, uptime, or scalability. 

The 23900 security gateway offers maximum security performance with 128 Gbps of firewall throughput in a compact 2U chassis. It supports the fastest connectivity standards up to 100 GbE and features modular expansion options with up to 42 network interfaces. 

Iron Mountain Introduces Iron Cloud Critical Protection and Recovery to Safeguard High-value Data

Grazed from Iron Mountain

Iron Mountain Incorporated, the global leader in storage and information management services, today announced Iron Mountain Iron Cloud Critical Protection and Recovery (CPR), a managed data protection solution to safeguard and restore critical data, providing confidence in recovery in the event of malicious denial of access attack. Available as part of Iron Mountain's Iron Cloud purpose-built portfolio of cloud-based solutions, Iron Cloud CPR enables organizations to proactively protect vital digital information through secure isolation of their most essential data, providing critical availability of clean data in the event it is jeopardized by a cyberattack. This solution, as part of an enterprise risk containment plan, helps mitigate reputational damage, costs and lost revenue potential from unplanned operational downtime. 

Organizations are applying digital capabilities to processes, products, and assets to improve operational efficiencies, enhance customer value, manage risk, and uncover new revenue opportunities. These digital transformation initiatives generate new types and sources of data increasingly targeted by malicious actors seeking to exploit the unique and highly valuable digital assets found in that data, especially medical and financial records. Today's attacks challenge organizations to find solutions with sufficient protection, full restoration and rapid recovery capabilities to prevent the potential loss of revenue and erosion in brand reputation and company trust. Taken together, these factors have led organizations to a data protection and recovery crossroads, where conventional backup and recovery approaches are insufficient in isolating critical digital assets and enabling restoration following a cyberattack.

How to Keep Customer Data Safe in the Cloud

Article Written by Avery Phillips

Your customers are important to you and your business. Being of significance to you, it would be fitting for you to keep the customer data you obtain out of harm's way. At the same time, you are considering cloud services to accommodate the large capacity of not only customer data but company data as well. So, how do you enjoy the benefits of off-site cloud computing, while keeping your data safe?

Below are some of the biggest threats to data loss, cyber attacks, and otherwise questionable methods of obtaining sensitive data, and what you should watch out for to keep your customer data safe on the cloud.   

Data Breaches

In 2017, we saw very large companies fall victim to massive data breaches, unwittingly releasing sensitive customer data. Equifax, a major credit reporting agency and the hardest hit, revealed information of 143 million US customers. Your business holds very sensitive customer data such as credit card information, social security numbers, and birthdates - all which can be used to turn your customer's loss into a cyber attacker's gain.

Why Maintaining Your Online Security is Vital to Your Business

There is no doubt that threats from cyber attacks are a serious problem for businesses. Companies of all sizes have been the subject of attack, and it can lead to serious problems for customers and clients. Making sure that your companies security is high is important not only to your company as a whole but also for your customer's confidence. Here are some of the ways you can help to maintain the security of your company.

Consider Online Solutions

One way that you can increase your security is to transfer your systems to the cloud. By having all of your data and personal information off-site, you are protected by another level of security. It doesn't just work for your business systems; you can also use it for your servers. Instead of having your own server in the office, you can rent dedicated servers from many companies. It means you can essentially treat it as your own server, although you benefit from expert technical support, flexibility as well as heightened security.

McAfee Integrates Advanced Analytics to Increase Security Operations Center Efficiency and Protect Endpoints and Cloud

Grazed from McAfee

McAfee, one of the world's leading cybersecurity companies, today announced new endpoint and cloud solutions that go beyond machine learning to take advantage of the speed and accuracy of advanced analytics, deep learning and artificial intelligence, and increase efficiency of security operations. Cyber threats and the data needed to defend against them continue to increase, overwhelming security teams and driving the need for open, efficient security operations. McAfee's new solutions make use of the automation, reasoning and data curation uniquely provided by advanced analytics technologies, allowing security teams to easily discover and assess data and root out threats. Through human-machine teaming and an open and interoperable cybersecurity platform, McAfee proves ‘Together is power,' with collaborative security that defends against shared adversaries.

"Security teams are increasingly overwhelmed by the complexity they face in their environments which hinders their ability to defend against the growing number of threats," said Chris Young, CEO of McAfee. "McAfee is acting on our ‘Together is power' principle with collaborative security that combines the unique advantages of people, machines and partners enabling teams to be situationally aware of security events and take swift action to thwart assaults, from the endpoint to the cloud."

FileCloud Unveils 'Breach Intercept' to Safeguard Organizations Against Dramatic Increase in Cyber Attacks

Grazed from FileCloud

FileCloud, the cloud-agnostic EFSS platform, today announced FileCloud Breach Intercept. The newest version of FileCloud offers advanced ransomware protection to help customers handle every phase of a cyberattack: prevention, detection and recovery.

FileCloud is deployed across 90 countries and has more than 100 VARs and Managed Service Providers across the world. Deployed by Fortune 500 and Global 2000 firms, including the world's leading law firms, government organizations, science and research organizations and world-class universities, FileCloud offers a set of unique features that help organizations build effective anti-ransomware strategies.

Global ransomware damage costs are expected to total more than $5 billion dollars in 2017, compared to $325 million dollars in 2015. Ransomware is growing at an estimated yearly rate of 350 percent with business enterprises becoming the priority target for hackers. Enterprise File Sharing and Sync (EFSS) solutions have seen an increase in ransomware attacks with 40 percent of spam emails containing links to ransomware. Whereas public cloud EFSS solutions such as Box and Dropbox offer centralized targets for ransomware attacks, FileCloud's decentralized private cloud reduces your company's exposure to potential attacks.

Data Security Guidance for Small Businesses

With high profile cyber attacks occurring on a regular basis, people who run small businesses are becoming increasingly concerned about their data security processes. For regulated businesses, there is a requirement to provide evidence that the company complies with the minimum requirements. For small businesses that don't have the same level of scrutiny as the larger, highly regulated businesses it can be harder to find support and guidance on responsibilities. 

However, businesses of all sizes must start paying more attention to the threat of cyber attacks, given that the type of businesses that criminals are targeting varies from a small start-up business to a global company that is a household name. Recently we have seen numerous cyber attacks hitting the news headlines, such as payday loan company Wonga who was subjected to an attack, leaving 245,000 customers affected. 

Cloud Computing: Google, Facebook at Center of EU Clash Over Cyber-Attack Law

Grazed from Bloomberg.  Author: Kit Chellel.

Google Inc. and Facebook Inc. are caught in the middle of a clash between European Union lawmakers on whether the U.S. technology giants should be covered by rules forcing companies to report cyber attacks to government agencies in the 28-nation bloc.

While the European Commission wants search engines and social networks included in a revamped law on network and information security, some lawmakers favor a more streamlined approach focusing on critical infrastructure such as banks and power stations...

Cloud Computing: How Secure Is Your Small Business? 5 Tips to Protect Against Modern Cyber Attacks

Grazed from Entrepreneur. Author: John Mason.

Today, technologies like cloud computing, mobility, social, and big data and analytics are enabling small- and midsized businesses (SMBs) to do more with less, reach new markets and focus on creativity and invention instead of IT. But with all this new opportunity comes responsibility. Whether an SMB is moving to the cloud or implementing a bring your own device (BYOD) mobile program, security should be part of the plan.

Each year, cyber crime costs the economy about $445 billion, according to the Center for Strategic and International Studies, and SMBs can be attractive targets for hackers tapping into this profitable black market. SMBs tend to have weaker online security, use cloud services void of strong encryption technology and lack the robust IT and internal policies needed to protect against increasingly sophisticated cyber-crime rings, which operate with an enviable efficiency and effectiveness...

Read more from the source @ http://www.entrepreneur.com/article/246473