Remove Backups Remove Digital transformation Remove Encryption
article thumbnail

BEST PRACTICES: Resurgence of encrypted thumb drives shows value of offline backups — in the field

The Last Watchdog

Encrypted flash drives, essentially secure storage on a stick, are a proven technology that has been readily available for at least 15 years. And yet today there is a resurgence in demand for encrypted flash drives. And yet today there is a resurgence in demand for encrypted flash drives.

Backups 133
article thumbnail

Protecting Oil and Gas Industry Infrastructure: Strategies for Resilience

SecureWorld News

Digital transformation: The integration of IoT, SCADA systems, and advanced analytics has increased operational efficiency but also expanded the attack surface. Develop backup and recovery plans: Data recovery plans are essential to mitigate the impact of cyber incidents.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Cybersecurity Rules for Financial Institutions in New York State Take Effect November 1, 2024

Thales Cloud Protection & Licensing

Encrypt "non-public" data both at rest and in motion or use effective alternative compensating controls for information at rest if approved by the CISO in writing. The feasibility of encryption and effectiveness of the compensating controls shall be reviewed by the CISO at least annually.

article thumbnail

The Rise of Non-Ransomware Attacks on AWS S3 Data

Thales Cloud Protection & Licensing

The Rise of Non-Ransomware Attacks on AWS S3 Data madhav Thu, 02/13/2025 - 04:39 A sophisticated ransomware gang, Codefinger, has a cunning new technique for encrypting data stored in AWS S3 buckets without traditional ransomware tools. Instilling a Sense of Urgency As a result, the company loses access to its data unless it has a backup.

article thumbnail

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Thales Cloud Protection & Licensing

Robust Encryption Strategies and Pseudonymization Robust encryption strategies and pseudonymization are crucial for protecting sensitive data and meeting data sovereignty requirements. Encryption ensures data is securely stored and transmitted, safeguarding it from unauthorized access or breaches.

article thumbnail

9 Considerations For Hong Kong Banks To Address The STDB Guidelines

Thales Cloud Protection & Licensing

The digital transformation initiatives have shifted the technology landscape and introduced new threats and risks. To address the escalating cyber risks, the Hong Kong Association of Banks (HKAB) developed and published guidelines for Secure Tertiary Data Backup (STDB). Controlled. Verifiable.

Banking 114
article thumbnail

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Security Boulevard

Robust Encryption Strategies and Pseudonymization Robust encryption strategies and pseudonymization are crucial for protecting sensitive data and meeting data sovereignty requirements. Encryption ensures data is securely stored and transmitted, safeguarding it from unauthorized access or breaches.