Three channel partner considerations for tackling ransomware
The public cloud has become a major focus of ransomware operators, who are always quick to seek out new opportunities for pay off.
Originally intended to spread quickly throughout on-premises settings, cyber criminals are now retooling ransomware to function on cloud native architectures and infect containers.
As a result, ransomware is now better able to propagate throughout and steal data from the public cloud. According to research from Veeam Software, 45% of production data was encrypted or affected during a ransomware attack and the latest Crowdstrike threat report found cloud exploitation incidents increased by 95% in 2022.
Candida Valois is field CTO for Scality. She’s an IT specialist with more than 20 years of IT experience in architecture, software development, services and sales for various industries. She is passionate about technology and delivering valuable solutions.
These threats have some companies reconsidering whether the public cloud is the best fit for their organization, or whether they should adopt a hybrid approach.
By staying updated on the latest storage options and how storage contributes to security, you’ll be adding value in your consultative role and offering technologies that help customers create a multifaceted data storage and security approach to stay ahead of change and vulnerabilities – with the flexibility they need.
Start with zero trust at the core
A multi-pronged strategy is necessary for ransomware prevention. This entails safeguarding typical ransomware infection pathways through the maintenance of strict authentication and access policies; routine analysis and immediate patching of internet-exposed software vulnerabilities; and network and endpoint security monitoring.
It’s also critical to use automation and administrator training to prevent cloud misconfigurations.
Core to this approach is a zero trust security architectural design. This enables you to prevent unauthorized access to data and services, and enforce access control in a granular way.
No matter how distributed a network becomes, or what mix of hybrid or cloud infrastructure is used, an organization can…