Intelligent CISO Issue 52 | Page 29

Organisations need tools to defend themselves , both to protect their data and to detect early signs of intrusion .
Organisations can best improve their cloud security with a backup solution that offers anomaly detection and backup comparison .

? editor ’ s question ansomware continues

R to hamper businesses around the world , locking them out of their business workflows and demanding exorbitant payments . With the availability of Ransomware-as-a- Service ( RaaS ), those attacks have become even more frequent , targeting ever-wider segments of businesses .

Organisations need tools to defend themselves , both to protect their data and to detect early signs of intrusion . And they need to be able to recover quickly and affordably should they experience a successful attack . The truth is that today , it is not really a question of if an organisation will be successfully breached , but more realistically simply a question of when .
ThoughtLab recently announced the findings of it 2022 cybersecurity benchmarking study , which revealed ‘ The number of material breaches respondents suffered rose 20.5 % from 2020 to 2021 and cybersecurity budgets as a percentage of firms ’ total revenue jumped 51 %, from 0.53 % to 0.80 %’.
Yet : ‘ 29 % of CEOs and CISOs and 40 % of chief security officers admit their organisations are unprepared for a rapidly changing threat landscape ’.

Organisations need tools to defend themselves , both to protect their data and to detect early signs of intrusion .

Organisations can best improve their cloud security with a backup solution that offers anomaly detection and backup comparison . Businesses need to understand not only what is in a backup but what changed between backups .
BRIAN DUNAGAN , VICE PRESIDENT OF ENGINEERING , RETROSPECT , A STORCENTRIC COMPANY
Using anomaly detection and backup comparison , administrators can identify exactly which files changed to signal an anomaly and evaluate their contents to isolate valid ransomware infections .
Next , organisations need to be able to do OS compliance checks . Many ransomware variants depend on unpatched systems for infiltration . Retrospect Backup now utilises its extensive footprint to aggregate system information and identify systems that are out of compliance with the latest version of each operating system .

Organisations can best improve their cloud security with a backup solution that offers anomaly detection and backup comparison .

The ideal backup solution should also support configuration encryption and Multi-Factor Authentication combined with a password prompt . That way , even if an attacker gains administrative access to the computer where the backup runs , they will not be able to access the program or the configuration files .
Last but certainly not least , the backup should enable flexible immutable retention periods , alerting the organisation when a file is leaving its retention period and enabling the organisation to choose if that is satisfactory or if the retention period must be extended . www . intelligentciso . com
29