Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Mr C Johnston ICT Teacher
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
INTERNET SAFETY FOR EVERYONE
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
November 2009 Network Disaster Recovery October 2014.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Quick login to multiple applications. What is Single Sign On SSO SSO is a software application that will be loaded onto workstations at Palmetto Health.
Student 1-to-1 Netbook Program Care and Use of Computers.
Protecting Your Information Assets
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
JKP Cloud Team Cloud Computing. What is cloud computing? Characteristics. Types of Cloud Computing. Deployment. Proposal. Concerns. Conclusion. AGENDA.
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
Downloading and Installing Autodesk Revit 2016
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.
Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC PUBLIC CO900G L03 - Design, Implement, and Manage FactoryTalk Security.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
INTERNET SAFETY FOR KIDS
Small Business Security Keith Slagle April 24, 2007.
CLOUD COMPUTING JAZ PATERNOSTER. DEFINITION Cloud computing is the use of ‘the cloud’ as a place to save files rather than in a personal computer, allowing.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Scout First Time Login and Setting Up PIN Number.
Computer Security By Duncan Hall.
Society & Computers PowerPoint
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Log Shipping, Mirroring, Replication and Clustering Which should I use? That depends on a few questions we must ask the user. We will go over these questions.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
What is YOUR Data Worth???. “Just because you're paranoid doesn't mean they aren't after you.” Joseph Heller, Catch-22.
California Telehealth Network Annual Overview.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Elmtree Backup as a Service Discussion Veeam Cloud Connect Chris Tew – Business Development Manager Bruce Lawrence – Service Delivery Manager.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
Veeam Availability Suite v9. Availability for the Always-On Enterprise.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Secure Data – a safe place in an unsafe world!
[Internal Use] for Check Point employees​
Common Methods Used to Commit Computer Crimes
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
46elks Add-In for Microsoft Office 365 Excel Makes it Easy to Add SMS and Voice to Any Website or App – Just Install, Select Numbers, and Hit Send OFFICE.
7 tips to prevent ransomware attacks on backup storage
Cyber Security & IT: What’s Next?
Business Risks of Insecure Networks
Cybersecurity Awareness
Risk of the Internet At Home
Ransomware: What is it, How to avoid it and How to protect your data
Disaster happens; don’t be held hostage
Martus Account Set Up Benetech is a non-profit organization that develops and supports Martus, a secure information management software for human rights.
Take Cyber Security “TO HEART”
How to survive a ransomware attack and live to tell about it
Part 3.
WannaCry Ransomware Overview
Top Ten Cyber Security Hygiene Tips
The Secure Contingency Plan
Presentation transcript:

Using the Cloud to secure your data.

History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward to 2005 and begin seeing different types of ransomware in the wild. In 2012 Reveton is the first observed instance of mass- deployed ransomware. Late 2013 to mid 2014 Cryptolocker made off with $3 Million The FBI, through their Internet Crime Complaint Center (IC3), released an alert that between April 2014 and June 2015, the IC3 received 992 CryptoWall- related complaints, with victims reporting losses totaling over $18 million. Ransomware gives cybercriminals almost 1,500% return on their money. almost 1,500%

Cryptoworms: The future of ransomware hell! Cryptoworm ransom starts at $1 million Once the Cryptoworm is launched, “the malware is more or less unstoppable. In the span of an hour, over 800 servers and 3200 workstations are compromised; half the organization's digital assets, and the vast majority of the company's data are encrypted. Cisco Talos – “If enterprises don't start making strides towards defensible architecture today, massive ransoms may end up getting paid tomorrow.”

How can we save ourselves! More Importantly, why is Veeam here speaking of Security and Randsomware? Backup recovery is your last line of defense to having to pay out a ransom to the attackers; it's your last bastion in the event that the worst has happened.

How to avoid Crypto Locked backup files. 1. Use a dedicated account to access the backup share When you are using a share as the backup target, instead of connecting to it with your username and password, use your computer account. 2. The Rule. Number 1, meaning one copy of the backup stored off site, is especially important here. Your data will be much more secure by simply making sure that you have at least one read-only, backup copy stored in the cloud or on an offline storage like tape 3. Do not over permission your backup service accounts. Only allow the appropriate access for your backup service account. Don’t let your backup software be the Weakest point of security. 4. Visit our Veeam Booth to find out more about Veeam CloudConnect as well as our other offsite/offline backup storage options

Conclusion! Ransomware attacks are on the rise lately. In many cases, it isn’t easy to recover from. FBI cyber division recommends these three options if you get attacked by Ransomware: 1.Call the FBI and they will try to assist. 2.Roll back to GOOD, CLEAN, VERIFIED BACKUPS. 3.Pay the ransom! You would be surprised by the number and size of companies they have had to tell to pay the ransom. So, while having a good backup solution ready is a great layer of defense, make sure that you take necessary precautions to avoid the Trojan encrypting your backup files as well. And, remember to test your backups!

trial available at veeam.com/downloads Questions? Nicholas Serrecchia System Engineer, Veeam Software