Cyber attackers have been enjoying favourable conditions for attacks in recent years. The shift to remote working created huge vulnerabilities within corporate data infrastructures, giving attackers more attack vectors to leverage than ever before. Meanwhile, US officials are warning that Russian hacker groups could be retaliating against sanctions by launching widespread cyberattacks against US and European organisations.
At the same time, while most software solutions were patched after Log4J vulnerabilities were made public in November 2021, the zero-day threat left the door open to vast amounts of corporate data. By implanting hidden backdoors and malware, attackers have managed to hunt credentials, take remote control of admins workstation and implant malware into files that have since been saved as backups. As a result, many companies are hosting dormant malware within their backups, only to discover them on retrieving backup data. In fact, Verizon found that in 60 percent of ransomware cases, the malware ends up installed directly or via desktop-sharing apps.
As the explosion of ransomware continues, IT Security teams need to be more vigilant in identifying new vulnerabilities within their data stacks and develop new strategies to protect their data against attacks. In Episode 1 of Asigra’s Original Series, ‘Ransomware 2.0: Shield your data from Attack Loops,’ we’re discussing how the rise of new ransomware softwares is impacting IT security and exploring best practices for protecting corporate data from ransomware attacks.
Topics for discussion include:
- Why the explosion of ransomware presents a major threat to IT security and to the wider business
- The shortcomings of legacy security strategies in preventing companies from ransomware attacks
- How to protect data against a tidal wave of new ransomware softwares
- And more…