“Cyber criminals are now utilizing advanced techniques, including artificial intelligence, to penetrate the data center and corrupt critical data assets. Organizations need to be smarter and more aggressive in combatting these attacks, instead of using common and predictable approaches which have not worked in the past,” said Jim McGann, VP of Marketing and Business Development for Index Engines.
The reports from Scripps Health on the recent string of cyberattacks confirms the involvement of ransomware. As per 10news, one patient, who had broken his neck, was not only able to get needed CT scans but anything related to the hospital visit.
Reacting to this Jim McGann, VP of Marketing and Business Development for Index Engines, said, “Cyber criminals are now utilizing advanced techniques, including artificial intelligence, to penetrate the data center and corrupt critical data assets. Organizations need to be smarter and more aggressive in combatting these attacks, instead of using common and predictable approaches which have not worked in the past.”
“These
new approaches include protecting the backup data, checking the
integrity, and ensuring that when they are attacked, they can recover
quickly with a known good backup,” he added
As per McGann, Backup
data is critical when recovering from a ransomware attack. Knowing that
it is common for cyber-criminals to encrypt and corrupt files, backup
is where organizations turn to bring the business backup to pre-attack
conditions. If organizations do not check the integrity of the data in
the backups they will be faced with an unwelcome surprise when using
these backups to recover. Many will find these backups corrupted, and
the data inside these images encrypted and unusable. Organizations that
blindly backup data, and do not validate the integrity of the content
do not have the confidence they need to ensure a reliable recovery from a
cyber attack. Cyber criminals are smart and understand a company’s
environment. They will corrupt data, and backups and make it difficult
for any company to recover. If a company is continually validating the
data’s integrity, they will outsmart the threat actors and enable a
rapid recovery.