… counter growing malware threats. It prevents ransomware “attack loops,” which infect backup data and force ransom payments.
The platform uses bidirectional malware detection, zero-day exploit protection, variable repository naming and two-factor authentication (2FA) for a full defensive suite against advanced ransomware and other cyberattacks on backup data.
Eran Farajun, Asigra’s executive vice president, tells us his company is a 100 percent channel-focused organization, allowing partners to both resell the software and establish a cloud-based data protection service using Cloud Backup v14.
“With ransomware actively targeting backup data using attack loops, businesses, MSPs and VARs require defensive technology to stop these threats,” he said. “An attack loop occurs when hackers insert executable code within the organization’s backup data. When an attack occurs, both primary and secondary data are impacted, preventing the possibility of a clean recovery. To hide the code in the backup set, hackers insert the malware into data objects and other techniques which are backed up and stored in the company’s secondary storage repository. After a time-delayed detonation, the company restores a pre-attack generation of data only to realize that the recovery data reinserts the ransomware in to the network, recreating the ransomware for a perpetual loop of attacks.”
The security and compliance updates in the new platform provide several advantages for highly regulated industries such as health care, financial services and government entities, Farajun said.
“For MSPs, VARs, CSPs and other IT service providers supporting the data-protection requirements of their customers, Asigra’s technology offers the only cloud-based backup solution to address this challenge and ensure a viable recovery,” he said.
A new survey by B2B research firm Clutch shows a high number of employees are using personal devices to access company email and shared documents, often without any oversight. The survey included 1,000 full-time employees.
“Normal” or accepted employee behavior often presents the “most dangerous security threats,” said Randy Battat, CEO of PreVeil, a company that provides end-to-end encryption for email and file sharing.
“Employees believe that information that needs to be protected is special, sensitive stuff that’s explicitly marked and that most of the everyday communications they receive and send aren’t a risk for their organizations,” Battat said. “The reality is that the majority of communications and an organization’s intellectual capital can be found in the ordinary email.”
The study suggests that to ensure employees recognize and comply with security policy, companies should implement consistent cybersecurity policy training.
Ever think, "Does my company have the right mobile strategy for this era?" Find out how you can help your clients a… twitter.com/i/web/status/1…
October 18 2019 @ 20:15:05 UTC
In our webinar learn about workplace communication trends that will help you scale your business in 2020. @nextiva dlvr.it/RGT7ks
October 18 2019 @ 15:43:02 UTC
Want to keep up with the hottest channel headlines? Our weekly newsletter is for you. Sign up here >>… twitter.com/i/web/status/1…
October 17 2019 @ 18:01:04 UTC