“Give me your gut!” (as in “gut feeling”) has long been the cry of business continuity management in meetings, trying to make sense of complex situations or cut through to the essentials.
According to a recent Kaspersky Lab report, attackers who demand a ransom in return for not launching a DDoS attack (or to call off an attack in progress) can earn thousands of dollars in bitcoins, enabling the profitability of such attacks to exceed 95 percent.
"And the fact that the owners of online sites are often willing to pay a ransom without even checking whether the attackers can actually carry out an attack (something that other fraudsters have already picked up on) adds even more fuel to the fire," the report notes.
DDoS attacks, according to the report, can cost anywhere from $5 for a 300-second attack to $400 for a 24-hour attack.
While data backup and replication have their similarities, they are not the same, and rather than competing with one another can be used as complimentary tools to maximise the efficiency of an IT environment.
Data backup is the process of taking a copy of data at a fixed point in time and storing it for a set time frame (retention) in an alternate location to its original source.
Backups are typically used to make sure regulations and compliance around data protection are being met, and to protect against data loss.
Business analytics are often suggested as the “cure” for gut feeling.
Instead of trying to deal with emotions or personal preferences, the idea is to use facts as the basis for decision.
As I’ve said many times, cybersecurity seems to be more about reacting than acting or being proactive. Now, a new study by 1E found that, in fact, IT professionals spend a third of their time reacting to emergencies.
Nearly 30 percent of the IT tasks are unplanned, which works out to be about 14 weeks of job time per year. More than half of the respondent admit that a problem that is found relatively quickly (within an hour) can take most of the day to resolve.
While this study looks at IT as a whole, it fits into the scope of security, as well. Think of the amount of downtime that is caused by a security incident and how long it takes you to get the company up and running properly again, or how long it takes to resolve that incident. Then ask yourself if you were prepared to address the security incident. Again, I think the formal statement that Sumir Karayi, founder and CEO of 1E, made is as applicable for security as well as overall IT functions:
We knew that IT teams spend a lot of time on unplanned incidents, but we didn’t think it was this high – one third of their time. That’s taking a huge toll on their ability to innovate.
IRVINE, Calif. – Vision Solutions, a leading provider of business resilience solutions for IBM Power Systems, published episodes two and three of its “Power Talk” podcast.
Episode two features a conversation with guest Larry Youngren, retired leader of IBM’s remote journaling team for IBM i and well-known author and speaker on high availability (HA). Topics covered include:
- Meeting timely recovery point goals through remote journaling
- Understanding the key differences between hardware and software replication
- Techniques for optimizing remote journaling performance and bandwidth usage
- Three tips for evaluating HA options
Episode three features a conversation with guest Ron Peterson, retired leader of IBM’s clustering team for IBM i and former senior product strategist for MIMIX. Topic related to IBM i HA are covered, including:
- Clustering in today’s HA options
- Unique HA challenges for IBM i systems
- Significant differences between SAN and software replication
- Tips for finding the right high availability solution
The Vision Solutions Power Talk podcast series is available at: http://www.visionsolutions.com/powertalk
“The conversations in these episodes continue what we started with our first podcast: tapping industry legends to give their invaluable perspectives on modern trends,” said Edward Vesely, EVP and CMO of Vision Solutions. “The stories and commentary in our Power Talk podcast series are invaluable to IT professionals seeking to better understand and optimize the technologies they rely upon to keep their organizations up and running.”
About Vision Solutions
Vision Solutions is a leading provider of business resilience solutions – high availability, disaster recovery, migration and data sharing – for IBM Power Systems. For more than 25 years, customers and partners have trusted Vision to protect and modernize their environments, whether on-premises or in the cloud. Visit visionsolutions.com and follow us on social media, including Twitter, Facebook and LinkedIn.
New Ransomware Prevention Checklist Provides Actionable Steps to Recover from and Prevent Costly Cyber Attacks
SUNNYVALE, Calif. – Zetta, a leading provider of high-performance business continuity solutions, today released a new Ransomware Prevention Checklist which provides actionable advice to help recover from and prevent ransomware attacks. It includes immediate steps that can be taken when infected by ransomware to mitigate its impact along with top attack prevention tips that can be implemented to minimize threat risk.
“The high cost of ransomware has made threat mitigation a top priority for businesses of all sizes,” said Mike Grossman, CEO, Zetta. “To help prevent the risk of ransomware, and to provide immediate guidance for those that have had the unfortunate experience of being hit by an attack, our new Ransomware Prevention Checklist is an excellent resource. It offers simple, actionable advice that can help any data-driven business protect themselves from the high cost, and agony, of ransomware.”
According to the Federal Bureau of Investigation, ransomware attackers collected more than $209 million from victims during the first quarter of 2016 alone and as many as 50% of ransomware victims paid the ransom in an attempt to recover their data. Adding to the high cost of ransomware, is its impact on IT downtime. The State of Disaster Recovery Surveyreports that virus and malware attacks are the fourth cause of IT downtime, following power outages, hardware errors and human errors.
The Zetta Ransomware Prevention Checklist offers top steps to prevent the impact of a ransomware attack and tips for safer online behavior, security tools and computer protection to minimize risk and safeguard valuable data from compromise.
To view the Zetta Ransomware Prevention Checklist, visit: http://www.zetta.net/resource/ransomware-prevention-checklist.
Zetta is an award-winning provider of high-performance cloud-first data protection and disaster recovery solutionsthat are a worry-free choice for businesses and managed service providers. The Company’s direct-to-cloud approach provides businesses a fast and reliable way to protect, access and quickly recover their business-critical data and systems—both physical and virtual – without the need for costly extra hardware. For more information, visit www.zetta.com.