Tagged in

data security

Rubrik -  - Isolated Recovery & Ransomware: Cost vs. Value

General Tech

Isolated Recovery & Ransomware: Cost vs. Value

Has a vendor been talking to you about Isolated Recovery recently? Or have you been thinking about duplicating and air gapping your backup systems with scheduled updates to protect against ransomware? Could there be a less expensive, less complex way to achieve similar benefits? Let’s dive into these ideas to explore the concept and limitations of Isolated Recovery–and where Rubrik can help. What is Isolated Recovery? From a network perspective, the concept of air gapping isn’t new. Simply put, there’s physical isolation between two networks – most commonly a secured and an unsecured network. While Isolated Recovery shares this “physical isolation” characteristic, it is built on the concept of having a separate data center infrastructure that is disconnected from the primary infrastructure via an air gap. In the case of Isolated Recovery, the air gap is closed on a regular schedule for replication updates. Think of this as being similar to the operational overhead of a DR infrastructure. In theory, if your files are encrypted by ransomware, there is complete surety that your air-gapped data isn’t affected and is available for restore. Is there a real benefit? You might already be thinking about update schedules. What if the ransomware isn’t detected…
Rubrik -  - Security 101: What Security Really Means For Data Management

Business

Security 101: What Security Really Means For Data Management

Data security is not a new priority for enterprises. In earlier blog posts, we discussed the rising threat of ransomware and how a next-gen data management solution prevented a ransomware attack. Given the exponential growth of data and increasing trend in data breaches, it is imperatives that businesses apply the highest security standards to all their data. However, the concept of security is often confounded in the context of data management. To clarify the important terms, components, and their implications for data security within enterprise backup and recovery, I sat down with Adam Goldberg, who leads product development for Rubrik’s security solutions. Adam comes from a security background with previous experience at the Department of Defense.Federal Information Processing Standard (FIPS) Federal Information Processing Standard (FIPS) FIPS 140-2 is the National Institute of Standards and Technology (NIST) security standard used to accredit cryptographic modules. It is often a requirement for a product to be installed in a location where sensitive data is stored. The FIPS 140-2 standard extends far beyond the federal government. For example, financial and healthcare institutions collect, store, and transfer highly sensitive information that needs to be secured. While FIPS 140-2 features four levels of security, only Level…
Rubrik -  - Langs Building Supplies Stops Ransomware Attack in its Tracks

Customers

Langs Building Supplies Stops Ransomware Attack in its Tracks

A ransomware attack prevented by a reliable, next-gen backup solution Langs Building Supplies, a leading supplier of timber products in South Queensland, Australia, was recently hit by a ransomware attack. Due to its effective backup infrastructure, the company was able to thwart the threat and restore its data without paying a ransom. Ransomware is a special type of malware that encrypts victims’ data and prevents them from accessing it until a ransom is paid. In a previous post, our security lead David Ramos explained the rising threat of ransomware and strategies for prevention. As Ramos stated, “With an effective backup solution, ransomware can ideally be reduced to a minor inconvenience.” This was certainly true for Langs Building Supplies. We sat down with Matthew Day, ICT and Support Manager at Langs Building Supplies, to discuss his experience defending against a ransomware attack. Q: How were you able to identify a ransomware attack had occurred? A: We have monitoring tools in place to send alerts when there are high change rates in the data structure. An alert was triggered, and we were able to shut down the affected VDI desktop within minutes. Because we could stop the attack mid-stream, we were able…
Rubrik -  - Why Your Hospital May be Held Hostage Without Healthy Data Protection

Business

Why Your Hospital May be Held Hostage Without Healthy Data Protection

There’s a crisis in healthcare. The crisis we are referring to is not the economic system, but rather cyber threats targeted at hospitals’ data. In February, a cyberattack in Los Angeles left the Hollywood Presbyterian Medical Center paralyzed without access to electronic records while its hackers held its computer systems captive for a reputedly multi-million dollar ransom. The result – a 40 bitcoin (approximately $17,000) payment and a loss of operations for over a week. This cyberthreat, known as ransomware, is growing and is predicted to increase in 2016. In one week alone, three hospitals were hit by ransomware attacks. How do hospitals protect themselves from ransomware threats? To answer this question, we sat down with David Ramos, who leads the development of Rubrik’s security measures. Ramos has a Ph.D. from Stanford in Computer Science and discovered dozens of security bugs in open source software, including three in OpenSSL for which security advisories were issued. Ramos explains why hospitals are especially vulnerable to these types of attacks, and why data protection and security need to be integrated at the highest standard in a reliable backup solution. Q. What is Ransomware? How is Ransomware different from other cyber threats? A. Ransomware…
Rubrik -  - Meet the r599 BC: Bringing Backup Back

Culture

Meet the r599 BC: Bringing Backup Back

Rubrik is proud to announce our latest product, the all new r599 BC. r599 BC does one job and does it best: archival to papyrus. “Backup is dead,” they said. “Even the dead need backup!” we believe. During our beta testing, the most crucial piece of feedback we received was from Mr. Tutankhamun, C.I.O., Pharaohmatix Inc. “We deal with sensitive data, and we need encryption, not just backup,” he said. Enter r599 BC: papyrus archival with encryption using hieroglyphs. r599 BC is the world’s first converged data management platform with state-of-art ancient encryption built right into it. What’s more, there’s no master key we can forge to break the encryption. That means you own your data. Now. Always. The customer testimonials are flying in, and they all agree: r599 BC is light-years ahead of its time. “You guys made backup sexy again.” “Rock solid backup!” “Now I can backup all of Cleopatra’s selfies without worrying!” It’s product of the century. With r599 BC, data security will never be the same again. The government can not have and will never have access to your data.
  • 1
  • 2