01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

a version of your data be<strong>for</strong>e the attack, and you gain back control over your data. This way, the damage<br />

done by the ransomware attack is reduced to a minimum.<br />

However, by the time you find out about the attack, the attackers probably already copied and stole your<br />

company data. This is where encryption comes in, as the second protection measure against<br />

ransomware.<br />

Every business possesses confidential in<strong>for</strong>mation and data that should not be disclosed, such as<br />

personal data of customers or trade secrets. There<strong>for</strong>e, it is important to protect this in<strong>for</strong>mation as best<br />

as possible, <strong>for</strong> example through end-to-end encryption. When encrypted, the data contents are protected<br />

from malicious software, since only worthless strings are transmitted to the attackers. Thus, without<br />

interesting data, no worthwhile attack scenario arises, as the affected company cannot be blackmailed<br />

into paying a ransom.<br />

In the case of unencrypted data being involved in a data leak, there is no guarantee that the attacker will<br />

not still publish sensitive data, regardless of whether the ransom has been paid. This would hit companies<br />

particularly hard, as they not only suffer a huge financial loss but also must take responsibility <strong>for</strong> the lost<br />

data.<br />

In combination with the cloud, encryption solutions can offer even greater protection. In the event of an<br />

attack, all securely encrypted files are protected and can be restored even if the attacker deletes the files.<br />

However, regular backups and cloud-optimized encryption solutions, like Boxcryptor, are required to<br />

ensure continuity. At the same time, it is important to choose an encryption solution with zero-knowledge,<br />

so that only authorized people in your company will have access to sensitive company files.<br />

An example: You decide in your company to store the data not only locally, but also with an automatic,<br />

regular backup in the cloud storage of Microsoft and Dropbox. Additionally, you encrypt those data with<br />

Boxcryptor be<strong>for</strong>e uploading to the cloud. If you now become a victim of a ransomware attack, you can<br />

restore the affected data via your last backup in the Microsoft or Dropbox cloud. Moreover, you can be<br />

sure that the attacker will not be able to do anything with the stolen data, as this data has been encrypted<br />

with the key known only to you and is thus not visible to the attacker. You can rest easy and do not have<br />

to pay a ransom.<br />

Conclusion<br />

Companies all over the world are falling victim to ransomware attacks. However, it is important to ask<br />

how well or poorly prepared an organization is in the event of an attack. Fortunately, there are<br />

preventative measures that can be taken:<br />

- Make employees aware of spam and phishing emails.<br />

- Back up your data regularly.<br />

- Protect sensitive files with zero-knowledge encryption solutions.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 34<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!