Sunday, 8 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Regulation & Policy > Cyber Consultant Shares 6 Tips to Avoid Ransomware Attacks
Regulation & Policy

Cyber Consultant Shares 6 Tips to Avoid Ransomware Attacks

Last updated: July 2, 2024 12:54 pm
Published July 2, 2024
Share
Cyber Consultant Shares 6 Tips to Avoid Ransomware Attacks
SHARE

TEMPO.CO, Jakarta – Cyber safety guide Spentera highlighted that ransomware just lately focused the Non permanent Nationwide Knowledge Heart or PDNS additionally threatens each the personal and public sectors. 

Quoting the analysis revealed by Cyberint, Spentera defined that ransomware assaults rose by 55 % from 2022 to 2023. Of the victims surveyed, 69 % stated they’d paid the requested ransom totaling US$1.1 billion.

Tactically, ransomware operates via unlawful entry to programs usually on the market on the darkish net, supported by a Ransomware as a Service (RaaS) mannequin that makes the assault more durable to trace. As soon as the system is contaminated, the info is then encrypted and the victims are requested to pay a ransom.

Spentera’s Director of Blue Workforce Operations, Thomas Gregory, defined that implementing multi-factor authentication or MFA and common system updates is important to attenuate ransomware assaults. Community entry restrictions and segmentation are a should to detect and hinder hacker actions.

“Not solely do these measures strengthen cyber defenses, however in addition they guarantee extra complete enterprise operational safety. It’s additionally important to coach staff on cyber consciousness and safety recurrently,” Thomas stated in a press release quoted by Tempo on Monday, July 1, 2024. 

Thomas stated the mix of subtle expertise and ongoing cyber consciousness schooling is the important thing to stopping such assaults. “With the appropriate backup and restoration insurance policies, organizations can recuperate shortly after an incident and reduce losses,” stated Thomas.

6 Measures to Shield Programs from Ransomware

1. Implement Multi-Issue Authentication (MFA)

MFA is meant so as to add a layer of safety to a system to keep away from entry from unauthorized customers. For the reason that verification course of is multi-layered, information can nonetheless be secured even when the password was beforehand stolen.

See also  UK consumer protections against cyber attacks come into force

2. Patching and updating the system recurrently

This step is obligatory as a result of it may well assist shut safety gaps and defend the system from new threats.

3. Limiting entry to varied sources over the community

Controlling and limiting entry to sources via the community to solely related customers would restrict the attackers’ house to search out loopholes. 

4. Implement Community Segmentation and Traversal Monitoring mechanisms

In easy phrases, a community is split into separate segments or subnets. This helps the safety workforce monitor actions occurring between these segments, together with incoming and outgoing site visitors, to detect and hinder motion by the attacker.

5. Implement Identification Entry Administration (IAM) and Privileged Entry

Organizations are suggested to make use of instruments that allow environment friendly administration and restrict using admin accounts to guard identification and privileged entry.

6. Implement information backup and restoration procedures and insurance policies

Knowledge backup may very well be one of many choices to stop ransomware attackers from reaching their targets, getting the victims to pay a ransom. With complete backup and restore insurance policies and procedures, information may be recovered shortly after a hacking incident.

ALIF ILHAM FAJRIADI

Editor’s Selection: 10 Nations Battling Main Knowledge Breaches; Canada Included

Click here to get the newest information updates from Tempo on Google Information



Source link

TAGGED: Attacks, avoid, Consultant, Cyber, ransomware, shares, Tips
Share This Article
Twitter Email Copy Link Print
Previous Article 6 Lesser-Known Data Center Stocks to Add to Your Watchlist 6 Lesser-Known Data Center Stocks to Add to Your Watchlist
Next Article Patrick Zammit (TD SYNNEX) Patrick Zammit (TD SYNNEX) – HostingJournalist.com
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

What’s inside the LLM? Ai2 OLMoTrace will ‘trace’ the source

Be a part of our every day and weekly newsletters for the newest updates and…

April 11, 2025

Wipro extends relationship with the John Lewis Partnership to complete cloud transformation  

Wipro, a expertise companies and consulting firm, has been chosen by the John Lewis Partnership…

August 30, 2024

Self-positioning microdevices with circularly polarized luminescence enable adaptable 3D display

Schematic illustration of the adaptable spatial show and depth info interplay with high-performance CPL. Credit…

May 20, 2025

Christian Spindeldreher, Dell Technologies: Powering AI at scale

Dell Applied sciences is betting on AI as firms transfer from small pilots to full-scale…

September 19, 2025

ICEYE Closes $65M Extension to Existing Growth Round

ICEYE, a Helsinki, Finland-based firm which makes a speciality of artificial aperture radar (SAR) satellite…

December 19, 2024

You Might Also Like

How to avoid drowning in data at the expense of freshwater supplies
Global Market

How to avoid drowning in data at the expense of freshwater supplies

By saad
Defensive AI and how machine learning strengthens cyber defense
AI

Defensive AI and how machine learning strengthens cyber defense

By saad
The cyber hurdles that may deeply impact businesses in 2026
Global Market

The cyber hurdles that may deeply impact businesses in 2026

By saad
Breaking the ransomware kill chain: Why distributed lateral security is no longer optional
Global Market

Breaking the ransomware kill chain: Why distributed lateral security is no longer optional

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.