article thumbnail

Don’t Let Encryption Become A Double-Edged Sword That Undermines Zero Trust CyberSecurity

Joseph Steinberg

It is no secret that cybersecurity professionals universally recommend that people, businesses, and governments employ strong encryption as one of several methods of protecting sensitive information.

article thumbnail

Preparing for Ransomware: Are Backups Enough?

eSecurity Planet

In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but are they enough? Backups are a critical component of any enterprise cybersecurity posture, but they are not an airtight strategy. Why Are Backups Critical? The Argument for Backups.

Backups 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Groups Turn to Intermittent Encryption to Speed Attack Times

eSecurity Planet

To accelerate the ransomware encryption process and make it harder to detect, cybercriminal groups have begun using a new technique: intermittent encryption. Intermittent encryption allows the ransomware encryption malware to encrypt files partially or only encrypt parts of the files. Others are automated.

article thumbnail

Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says

eSecurity Planet

Even the most advanced and sophisticated security tools are failing to protect against ransomware and data exfiltration, according to a new report from data encryption vendor Titaniam. 73% had backup and recovery systems. Also read: Best Backup Solutions for Ransomware Protection. Data Security and Encryption.

article thumbnail

12 Data Loss Prevention Best Practices (+ Real Success Stories)

eSecurity Planet

Then, evaluate current network security measures to discover any gaps or redundancy that should be corrected. By modifying your DLP policy in this way, you can develop an effective plan that meets your organization’s specific requirements and improves overall data security efforts.

Backups 134
article thumbnail

How to Decrypt Ransomware Files – And What to Do When That Fails

eSecurity Planet

The best defense and the best option for recovery will always be the availability of sufficient, isolated data backups and a practiced restoration process. However, even with the best planning, organizations can find a few users, machines, or systems that were overlooked or whose backup may be corrupted or encrypted.

article thumbnail

Ransomware at Colorado IT Provider Affects 100+ Dental Offices

Krebs on Security

based Complete Technology Solutions (CTS), was hacked, allowing a potent strain of ransomware known as “Sodinokibi” or “rEvil” to be installed on computers at more than 100 dentistry businesses that rely on the company for a range of services — including network security, data backup and voice-over-IP phone service.