article thumbnail

Ransomware attack on New York Law Department

CyberSecurity Insiders

And authorities state that the backup and recovery process of information could take days or weeks under present circumstances. Christopher Wray, the Director of the FBI stated that ransomware threats have the potential to be treated as global terrorist threats such as the September 2001 attacks.

article thumbnail

Data Encryption for Cloud Backup Security

Spinone

In traditional on-site backup systems security is mainly a physical concern – ensuring data is backed up in more than one location in case of hardware loss or failure and restricting access to the physical backup media to only trusted employees. In cloud backup, security concerns are different.

Backups 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Email Provider VFEmail Suffers ‘Catastrophic’ Hack

Krebs on Security

Email provider VFEmail has suffered what the company is calling “catastrophic destruction” at the hands of an as-yet unknown intruder who trashed all of the company’s primary and backup data in the United States. Founded in 2001 and based in Milwaukee, Wisc., Every file server is lost, every backup server is lost.

Hacking 242
article thumbnail

Steel sheet giant Hoa Sen Group hacked by Maze ransomware operators

Security Affairs

The Hoa Sen Group (HSG) was founded in the year 2001, it has 7,100 employees across all its 343 companies and has been earning annual revenue of around $1.18 Hoa Sen Group is the no.1 1 company in the field of manufacturing and trading steel sheet in Vietnam and the leading exporter of steel sheet in Southeast Asia.

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

11, 2001, terrorist attacks. Scholars know what they think works: strong encryption, multifactor authentication, regular software updates, and automated backups. In his discussion of a potential backstop, Chertoff specifically references the Terrorism Risk Insurance Act (TRIA) as a model.

article thumbnail

The Cybersecurity Risks of Bluetooth

SecureWorld News

Bluetooth has been around since 1994 as a wireless connectivity specification, but the first mobile phones did not appear with basic Bluetooth services until 2001. It is always a good practice to review what has been migrated over since some devices may be from an old backup that were subsequently deleted.

Risk 73
article thumbnail

It’s not ‘See you later.’ It’s ‘Goodbye’: Moving on from Tokenization in the age of Ransomware

CyberSecurity Insiders

Tokenization was invented a little over twenty years ago in 2001 to address the risk of losing cardholder data from eCommerce platforms. It does not matter that the victims have their backup and recovery systems in order. Encryption-in-use, a.k.a. This data is then used to extort victim organizations, customers, and partners.