18.05.2021 Views

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

victims would feel they have no choice but to pay up – especially when sensitive personal data or medical<br />

records are at stake, or, as in the case of Duesseldorf University Hospital, a life hangs in the balance.<br />

Consider, too, initiatives like the General Data Protection Regulation (GDPR), which places the<br />

possessors of personally identifiable in<strong>for</strong>mation at greater risk of substantial fines if that data is leaked,<br />

and it’s clear that ransomware is a legal and ethical minefield that can only be successfully navigated by<br />

steering well clear of it in the first place.<br />

An end to ransomware<br />

With ransomware posing an increasingly serious threat to all organizations, it’s essential to take<br />

precautions – but not everybody is getting the message.<br />

McAfee and CSIS surveyed nearly 1,000 organizations late last year and found that only 44 per cent had<br />

cyber preparedness and incident response plans in place. Worse yet, just 32 per cent of respondents<br />

believed their plan was actually effective.<br />

The obvious first step, especially in light of the remote working boom, is to ensure timely patching of all<br />

your organization’s software and devices. While this won’t guarantee protection against attack, it will<br />

minimize your exposure.<br />

Education is a key component of this. Organizations need to ensure that all of their employees are aware<br />

of the importance of timely patching, and regularly briefed on the latest techniques being utilized by<br />

cybercriminals. It’s every organization’s responsibility to engage their employees with that training – it<br />

may seem time-consuming, but it’s vastly preferable to the alternative.<br />

Above all else, though, is data. Organizations need to control who has access to their data, and know<br />

exactly what they do with it. My company, Cryptoloc, is dedicated to protecting that data – which is why<br />

we’ve developed the world’s safest cybersecurity plat<strong>for</strong>m.<br />

Our patented technology – developed in collaboration with an elite team of cryptographers,<br />

mathematicians, data scientists and software developers – combines three different encryption<br />

algorithms into one unique multilayer process. It can be deployed across a wide range of applications,<br />

including file storage, document management and delivery, and counterfeit prevention and detection<br />

solutions. Our clients can send fully encrypted documents straight from Microsoft Outlook, and develop<br />

and build their own products on our secure digital plat<strong>for</strong>m.<br />

Our ISO-certified technologies ensure that organizations and their employees, contractors, clients and<br />

customers can interact securely, with each piece of data assigned its own separate audit trail, and every<br />

user and action verified and accounted <strong>for</strong>.<br />

Better yet, our ‘Zero Knowledge’ protocols mean we know nothing about the data our clients store with<br />

us. Our escrow encryption key recovery process ensures their data is theirs and theirs alone, and can<br />

only be accessed by the people they choose.<br />

64

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!