02.01.2024 Views

The Cyber Defense eMagazine January Edition for 2024

Cyber Defense eMagazine January Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 201 page January Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine January Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 201 page January Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

statement, and the other actions it’s taken, are a step in the right direction. Somebody needs to do<br />

something.<br />

<strong>The</strong> silver bullet<br />

But an international pledge is unlikely to be the silver bullet CISOs are still looking <strong>for</strong>. Or, at least, not<br />

this particular international pledge as it currently stands. While symbolically powerful with some good<br />

initial steps in the agreement aimed at monitoring and sharing at the nation-state level, it does not include<br />

actionable guidelines <strong>for</strong> the organizations on the front lines. At the very least this serves as a barometer<br />

highlighting the level of global concern around ransomware, but it remains to be seen how effective this<br />

pledge will be at disrupting payments mechanisms <strong>for</strong> ransomware actors and whether these actions will<br />

reduce the number of ransomware attacks. <strong>The</strong> pledges’ challenges are common to anyone who follows<br />

international policy: these things move slowly with too many caveats and exceptions. <strong>The</strong> pledge of<br />

course only covers the National level, and even then, it allows <strong>for</strong> exceptions to the refusal to pay ransoms<br />

in the event of emergency situations. And when is ransomware ever not an emergency situation?<br />

<strong>The</strong> main utility of CRI’s statement is that it’s opened once again, on a global scale, a conversation around<br />

data security and resiliency. This is helpful because it invites us to consider our current practices and<br />

fundamental assumptions around how we protect our data. We desperately need this conversation,<br />

because in my view we’re thinking about it all wrong.<br />

Prevention itself isn’t enough<br />

Most organizations tend to think about ransomware attacks in terms of prevention — how to stop them<br />

from happening in the first place. Huge swathes of cybersecurity budgets are spent trying to build digital<br />

walls high enough that no bad actor can ever get across. This isn’t a bad practice — preventive measures<br />

are important — but they are not infallible. What happens when ransomware is successful? Response<br />

time is important, but no matter how fast you respond to a successful ransomware attack or breach, you<br />

still must work to undo the damage caused and this is why having resiliency and recovery capabilities<br />

comes into play.<br />

It’s time <strong>for</strong> more conversation on this point. Not because the answer is particularly elusive, or profound,<br />

but rather because it’s right under our nose, and insufficiently discussed: Backup and recovery strategy.<br />

It’s frustrating that this is often seen as a nice-to-have when, in fact, it is really a fundamental aspect of<br />

your defense-in-depth strategy. More than anything else, including legislation, international agreements,<br />

policy positions, a sound backup and recovery strategy has the greatest potential to greatly reduce the<br />

impact of ransomware and bad actors.<br />

<strong>The</strong> power is within backup and recovery<br />

Ransomware is a problem, but there is a solution. Did you know that just over 50% of businesses have<br />

a backup and recovery plan? Having a sound backup and recovery strategy with purpose built backup<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2024</strong> <strong>Edition</strong> 83<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!