Remove Backups Remove CSO Remove Risk
article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

Let’s walk through some practical steps organizations can take today, implementing zero trust and remote access strategies to help reduce ransomware risks: •Obvious, but difficult – get end users to stop clicking unknown links and visiting random websites that they know little about, an educational challenge. Best practices.

article thumbnail

Average enterprise storage/backup device has 14 vulnerabilities, three high or critical risks

CSO Magazine

The average enterprise storage and backup device has 14 vulnerabilities, three of which are high or critical risk that could present a significant compromise if exploited. To read this article in full, please click here

Backups 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE: CrowdStrike outage reveals long road ahead to achieve digital resiliency

The Last Watchdog

Dimitri Chichlo , CSO, BforeAI Chichlo Our networks remain fragile because of interdependence and the assumption that technology always works. Additionally, conducting tabletop exercises for catastrophic failures and analyzing supply chain risks are crucial. Don’t make a bad situation worse.

article thumbnail

Should CISOs stop using Russian security and tech products?

CSO Magazine

The Ukraine-Russia conflict has raised the question of whether organizations should stop using Russian-made security and tech products and the risks of continuing to do so in the current situation. However, from a security-related standpoint, it’s much murkier,” says Shawn Smith, researcher and director of infrastructure at nVisium.

CISO 93
article thumbnail

Fire Doesn't Innovate by Kip Boyle (Book Review)

Adam Shostack

It is not a book for the CSO. They need to understand why cyber risks aren't like fire risks, they need to drive action by their company, and they don't need, want, or have the time to be able to talk about the difference between Fancy Bear and SQL injection. It is a book for executives, including, but not limited, to CEOs.

CSO 130
article thumbnail

Vulnerability Recap 9/9/24 – Exploited Vulnerabilities Persist

eSecurity Planet

These vulnerabilities represent significant dangers for end users and organizations — from the remote code execution vulnerabilities in Veeam Backup & Replication and Apache OFBiz to the severe access control issues in SonicWall and Google Android. All users should upgrade their systems to protect against this and other vulnerabilities.

Firmware 111
article thumbnail

9 most important steps for SMBs to defend against ransomware attacks

CSO Magazine

These are the nine tasks that SMBs should focus on to mitigate risk from ransomware attacks. Have a backup plan and tested recovery process. Some might argue that multi-factor authentication (MFA) is the best way to protect a firm, but I’d argue that having a tested backup and recovery process would be better.