Intelligent CISO Issue 35 | Page 67

decrypting myths

Don ’ t let endpoint devices be the start of your security woes

Australia-based Anthony Spiteri , Senior Global Technologist at Veeam , suggests three fundamental measures
IT leaders should introduce to safeguard their endpoint devices from ransomware threats .
020 was a

2 cybercriminal ’ s dream . With a spade of COVID-19 themed ransomware attacks and employees working remotely on unsecure networks , it ’ s no surprise Australia filed 59,806 cybercrime reports between July 2019 and July 2020 alone .

Recent research conducted across APAC by Kroll reveals that 47 % of all ransomware attacks succeeded by breaching Remote Desktop Protocol ( RDP ), while another 17 % came in through vulnerabilities related to VPNs and other remote access solutions . Ensuring watertight endpoint security is one of the biggest challenges facing IT teams and getting it right could be do or die for Aussie businesses .
To ensure 2021 isn ’ t marred by the same statistics 2020 saw , organisations across the region will need to commit to investing not only time , but also resources into strengthening their endpoint security strategies . Below are three fundamental measures IT leaders should introduce to safeguard their endpoint devices from ransomware threats .
Introduce foolproof structures
Adopt the 3-2-1 rule as part of your data management strategy . This easy-to-remember rule encourages organisations to store three copies of important data , on at least two different devices , with at least one of these copies being stored in the cloud .
The ‘ one ’ copy in the 3-2-1 strategy is arguably the most critical , therefore , it needs to be ultra-resilient . There are numerous forms of media where this copy of data can be stored securely , consider tape media , immutable backups in S3 or S3-compatible object storage , air-gapped and offline media , or Software-as-a-Service for backup and Disaster Recovery .
The 3-2-1 strategy can almost always guarantee an organisation ’ s data can be recovered in the case of a breach . This ensures minimal impact to Business www . intelligentciso . com
67