Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
3 Keys to Reducing the Threat of Ransomware
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/6/2019 | 9:40:27 AM
Re: RECOVER PLAN? HAHA
Update - in most data center environments, a "simple" backup and restore plan cannot exist.  The process of making it as simple as practicable is important and TESTING is most important.  My former manager at Aon was part of a test with Girl Scouts of America (of all things) at the IBM STERLING FOREST NY location.  9 hours to rebuild the infrastructure through backup restoration and ALL documented.  Now that was fine, but at the end IBM also wanted their servers restored, so that took more time.  Second, CATALOG backups for each day are necessary with offsite storage too.  Give me three tier backup storage and that is  a good plan.  I survived ransomware for my FAR smaller accounts because I had good plans in place.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/29/2018 | 9:20:34 PM
User training
To speak more to the point of user training... It's not enough to have the training; it also has to be effective.

The best solutions often tend to be rooted in training users/employees in good cyber hygiene for their personal lives and demonstrating how it's personally beneficial to them -- and then it's just that much more natural and that much easier to get them to extend that into their at-work lives.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/29/2018 | 9:18:42 PM
Re: RECOVER PLAN? HAHA
@REISEN: Of course, it's not enough to just have a backup anymore. We've even seen scenarios where entities paid the ransom even though backups existed because the ransom was less than the cost of restoring from backups.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:08:20 PM
Backups
Backups are generally not the solution for ransomware unless a good strategy is followed and old data is not overwritten. For example, moving into a table and not using that tape for a while is important.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:04:48 PM
Re: RECOVER PLAN? HAHA
ONE SIMPLE BACKUP SOLUTION would have solved that, right? I hear you, backup does not mean anything unless we can restore it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:03:19 PM
Re: RECOVER PLAN? HAHA
IT cannot do everything when disaser strikes and a constantly updated PLAN for rebuild, for backups, Unless they use proper tools to do these in an efficient ways. There are tools available for us to fail over DR site without so much effort.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:01:42 PM
Re: RECOVER PLAN? HAHA
Most firms THINK they have one - those guys in IT will know how to rebuild 37 servers and 402 workstations without a plan or documentation, right? I hear you, there has to be somebody who can understand security implications.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/29/2018 | 8:00:21 PM
Good options
All good options. They are not for only ransomware but for overall security of the business.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
10/29/2018 | 1:09:13 PM
Re: RECOVER PLAN? HAHA
And I hate posting here - the response type is soooooooooooooooooooooo tiny. LOL
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
10/26/2018 | 3:28:55 PM
RECOVER PLAN? HAHA
Most firms THINK they have one - those guys in IT will know how to rebuild 37 servers and 402 workstations without a plan or documentation, right?  That is what they get paid for, right?   Only they undersand it so we can let them do their thing when disaster strikes. HAHA big JOKE.  Nope, IT cannot do everything when disaser strikes and a constantly updated PLAN for rebuild, for backups, for restoration of damn near anything and everything HAS to exist.  Often they do NOT and rebuild EVERYTHING is a poor joke.  A waste of time and effort.  Atlanta lost EVERY SINGLE POLICE DASHCAM VIDEO.   Throwing hundreds of cases off the books in court.  ONE SIMPLE BACKUP SOLUTION would have solved that, right?    BUT FIRMS don't think they need one because only those guys in IT would understand it and, again, they can restore everything without a plan at 2:30 am.  (I had plans when I was consulting, tested because at 2:30 am I AM NOT THINKING STRAIGHT.  WHO IS?)

 

Stupidity rules.   Ignorance rules.  Blindness rules. 


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.