Tag Archive for: Recover

Majority of Organizations Uncertain They Can Recover from a Ransomware Attack, Says New Dell Technologies Report | Texas News


ROUND ROCK, Texas, Sept. 9, 2021 /PRNewswire/ —

News summary

  • Study shows organizations are managing more than 10 times the amount of data than they did five years ago
  • Eighty-two percent of IT decision makers are concerned their existing data protection solutions won’t meet all future business challenges
  • Sixty-two percent fear their existing data protection measures may not be sufficient to cope with cyber threats, while 74% agree they have increased exposure to data loss with the growth of employees working from home
  • Dell EMC PowerProtect Data Manager with Transparent Snapshots uniquely offer organizations a simpler, faster way to protect VMware virtual machines at scale without compromising performance
  • Dell EMC PowerProtect appliances with Smart Scale can deliver cost savings and simplified management for large data environments
  • Dell Technologies Managed Services for Cyber Recovery Solution helps reduce risk of data loss with Dell experts operating cyber recovery vault processes and supporting data recovery efforts

Full story

The Dell Technologies (NYSE:DELL) 2021 Global Data Protection Index (GDPI) findings reveal organizations are facing several data protection challenges driven by the constant threat of ransomware and the consumption of emerging technologies such as cloud-native applications, Kubernetes containers and artificial intelligence.

According to a recent IDC survey, more than one-third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months.i To help address these rising – and seemingly inevitable – issues, Dell Technologies is introducing new software and services to accelerate virtual machine (VM) backup data availability, simplify management of large data sets, and maintain business continuity while alleviating dependencies on day-to-day cyber recovery operations.

“While ransomware attacks can be devastating for people and businesses, accepting defeat as a foregone conclusion is not the answer,” said Jeff Boudreau, president and general manager, Infrastructure Solutions Group, Dell Technologies. “We understand the stakes have never been higher, and the…

Source…

Following computer hack, Covington expected to recover most of $100,000 spent in recovery | St. Tammany community news


Covington Chief Administrative Officer Erin Bivona recently told the City Council that the city expects to recoup most of the expenses it has spent to repair and recover the municipal computer system that was part of a nationwide hack in March.

The city has incurred more than $100,000 to date in equipment upgrades and software licenses since the Ransomware attack four months ago, Bivona told members in a July 13 meeting. Covington had a cyber security insurance policy at the time of the breach, which is expected to cover most of the unfortunate costs.

Hackers, taking advantage of a weakness in the Microsoft Outlook email platform, infiltrated more than 30,000 different computer systems on March 11, rendering the machines useless and tying up vital information at each for weeks on end. A variety of networks, from doctor’s offices, retail outlets and government entities, including Covington, were hit.

Bivona told the council the recovery has been “part sprint, part marathon.” 

City officials were quick to move when the hack was discovered early on the morning of March 11. Members of the Louisiana Cyber Investigators Alliance, made up of various police and government agencies, were on hand within hours of the breach and worked for two weeks to restore municipal operations and wage recovery efforts.

It was a challenging fortnight, Bivona said, but it’s not over. She said a consultant was hired to focus entirely on the hack. The city’s own IT department has also tackled the work, but has remained responsive to other needs in city government at the same time.

“Since the hack, we’ve been under disaster response recover mode,” she told the council. “And we’ll be there until the end of September.”

Bivona said Wi-Fi in city facilities is still not operational. And Munis, the computer program the city uses for all financial operations, such as payroll and utility billing, also remains compromised.

A weekly guide to the biggest news in St. Tammany. Sign up today.

“There are security concerns associated with Wi-Fi,” she said. “We’re rebuilding a…

Source…

Stolen or lost Android phone? Here’s how to recover it fast


find-my-device

Prepare now so you can find your lost Android phone with ease. 


Jason Cipriani/CNET

Is there a worse feeling than losing your Android phone? It may sound dramatic, but the realization that your phone is missing can induce an internal panic. Your phone is likely the most personal device you own, containing a massive amount of personal information. Not to mention, replacing a phone is a costly nuisance.

In the event your phone goes missing, don’t panic! There are tools built into every Android phone that make it possible to lock and track down a lost phone with ease. But first you’ll need to take some steps now to set yourself up for success if and when your phone does go missing — even if you only left it in the house. 

Below I’ll walk you through the free tools available to you to help you find your lost phone. 


Now playing:
Watch this:

How to find your lost Android phone



3:01

Be prepared

You can take a few steps now to be ready if you lose your phone.

Create a secure lock screen

Do yourself a favor and turn on passcode and fingerprint authentication. Do yourself another favor and don’t use facial recognition on your Android device. 

On most Android devices, the technology used for facial recognition can be easily tricked with something as simple as a photo of your face. Google’s Pixel 4 and Pixel 4 XL are the…

Source…

New Fonix ransomware decryptor can recover victim’s files for free


decryptor

Kaspersky has released a decryptor for the Fonix Ransomware (XONIF) that allows victims to recover their encrypted files for free.

Fonix Ransomware, also known as Xinof and FonixCrypter, launched in June 2020 but increased its number of victims significantly starting in November 2020.

Last Friday, one of the Fonix ransomware admins tweeted that they have shut down the ransomware operation and released the master decryption key.

“I’m one fonix team admins.
you know about fonix team but we have come to the conclusion.
we should use our abilities in positive ways and help others.
Also rans0mware source is completely deleted, but some of team members are disagree with closure of the project, like telegram channel admin who trying to scam people in telegram channel by selling fake source and data.
Anyway now main admin has decided to put all previous work aside and decrypt all infected systems at no cost.”  – FonixTeam

The Fonix ransomware admin told BleepingComputer that they had encrypted approximately 5,000 to 6,000 systems throughout its operation.

Soon after they shared the decryption, Michael Gillespie confirmed with BleepingComputer that the key was valid and could be used to decrypt a victim’s files.

Decrypting the FonixRansomware

The good news is that if you have been infected with the FonixRansomware, you can now decrypt your files for free using an updated version of Kaspersky’s RakhniDecryptor.

Download the decryptor to a device with encrypted files and start the program. You will be asked to agree to a license agreement, and the main interface will appear, as shown below.

RakhniDecryptor
RakhniDecryptor

When you are ready to decrypt your files, click on the Start Scan button, and the decryptor will ask you to select an encrypted file.

Once selected, the decryptor will look for your decryption key, and when found, begin to decrypt your files. BleepingComputer has tested the decryptor on an encrypted computer, and as you can see below, was able to decrypt the files.

Decrypting files
Decrypting files

After you have decrypted your files and determined that they are opening correctly, you can delete the leftover encrypted files.

For those who need help getting started using the decryptor, please read this…

Source…