With our constant internet usage and plethora of devices, there is more information being generated and shared than ever before. Also, because of the COVID-19 outbreak and majority of the workforce working at home, there are new security vulnerabilities that you need to be mindful of. As a result, the focus of cybercriminals has shifted and security solutions like Antivirus (AV) is no longer enough to be fully prepared against their sophisticated Ransomware attacks.
Now, don’t get me wrong. I’m not saying that security solutions are not required; in fact it is and will continue to be an important part of any Ransomware and cyberattack protection strategy, but the security landscape has changed a lot in the last couple of years, and you must implement more than ‘just’ AV to meet the challenges of today’s cyberthreats like Ransomware.
Today’s security landscape has changed, especially so in the past couple of years.
Customers require a more proactive attack protection to supplement basic AV. Using “just” AV or endpoint security product is like fighting with one arm tied behind your back. Note that Veritas Backup Exec has had its eye on the landscape and added protection technologies that are designed to help protect your critical data in case the worse happens.
In fact, When developing a framework for talking about Ransomware Resiliency, we’ve made the effort to align to language used by the NIST and CISA (Cybersecurity and Infrastructure Security Agency).
But do remember that NO single set of rules will protect every business, but thoughtful CIOs and CSOs take steps like these:
Focus on employees training: Make sure your employees know the dangers and what to avoid. By doing this, they will understand the risks of attachments and links in unexpected email, and downloaded software before it is scanned for viruses.
Educate about how file-sharing programs and free downloads may install malicious code automatically. Stop them with training, policies, and software.
Close security gaps: Protect network endpoints, not just perimeter. Make sure you analyse network traffic for signatures that match known cyberattacks.
Regular backups: Implement and enforce backup schedules – and automate the process as much as possible.
My final thoughts:
Though AV is not truly dead, it’s also not enough on its own. AV is a baseline capability required for any Rasnomware protection plan, but it’s just one piece that should be part of your broader arsenal to keep you and your information safe.
I am proud of the fact that we have a market-leading technology solutions like Backup Exec which has Ransomware Resiliency and that intelligence built into the solution to help protect your business better. Your businesses need more protection – not less – for your customers and employees, your reputation, and your business future.
If you want to learn more, I do encourage you to join me on my #WednesdayWebinar that is scheduled tomorrow (see details below) for How prepared are your against Ransomware attacks and why AV alone is NOT enough for changes in today’s Threat Landscape!
You will learn and see the ways systems are being infected today and mitigation steps you can take to protect your data and leverage #BackupExec within your environment which provides “assured recovery” from Ransomware!
Register for our LIVE #WednesdayWebinar:
How prepared are you against ransomware
Register ▻ https://bit.ly/BERansomware20
May 13 | 11:00 a.m. Singapore (GMT +8)
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.