DZone
Security Zone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
  • Refcardz
  • Trend Reports
  • Webinars
  • Zones
  • |
    • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • DevOps
    • Integration
    • IoT
    • Java
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
DZone > Security Zone > Ransomware: It Makes You ‘WannaCry’

Ransomware: It Makes You ‘WannaCry’

A security expert gives his take on data and cloud security policies in light of recent ransomware attacks. Read on for more!

Brian Yin user avatar by
Brian Yin
·
Jun. 08, 17 · Security Zone · Opinion
Like (4)
Save
Tweet
3.43K Views

Join the DZone community and get the full member experience.

Join For Free

It may be a silly name, but it certainly is not a silly topic. You are likely aware of the recent ransomware attack known as WannaCry that has infected more than 230,000 computers in 150 countries since Friday, May 12th. Among the notable victims are the National Health Service and FedEx, that have been asked for ransom payments in bitcoin.

Recent attacks like these have brought to our attention the importance of enterprises to protect themselves and their customers.

An Ounce of Prevention and a Good Backup

One area where CIOs have turned their attention is security software, and there are numerous innovative solutions that use the power of machine learning and AI to address prevention of such attacks.  While there are many solutions available, CIOs need to be aware that there is no failsafe prevention solution based upon AI/ML or firewall technologies.  Instead, CIOs need to recognize prevention is merely one piece of an overall protection strategy.

While CIOs and IT/System Administrators evaluate the strategies and dangers posed by attacks, they can take steps to ensure they are protected against such attacks through insurance. This insurance strategy is well understood, cost-effective, and likely well-practiced within their existing organization.

The insurance strategy under discussion here is backing up your data, also known as data protection. Having a data protection strategy does not necessarily prevent an attack from occurring but enables an organization to destroy all affected data, then recover all data from a backup taken before the data was infected. Many, but unfortunately not all, of the organizations recently impacted were able to address their security vulnerability and leverage backup copies to restore their data and avoid ransom requests.

Image title

But, What About the Cloud?

The rapid rise of multi-cloud infrastructure and next-generation cloud applications adds an additional layer of complexity to the challenge. A common belief held by many CIO’s is that if their data is safe in the cloud. This could not be further from the truth. A comprehensive data protection strategy needs to take all of the following factors into account:

  • Your application data needs to be protected even if the data is distributed across multiple data centers.
  • Your application data needs to be protected for multi-cloud and hybrid cloud environments.
  • Next generation applications built on highly distributed, eventually, consistent database platforms also need to be protected.

The cloud is not immune to ransomware attacks, so organizations need to be more vigilant than ever to ensure they are protected not just within their data center, but everywhere their data resides, and that means the cloud! A comprehensive data protection strategy will give you no reason to ever ‘WannaCry.’

Data (computing)

Published at DZone with permission of , DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Why I'm Choosing Pulumi Over Terraform
  • Deployment of Low-Latency Solutions in the Cloud
  • Modernize Legacy Code in Production: Rebuild Your Airplane Midflight Without Crashing
  • Java: Why Core-to-Core Latency Matters

Comments

Security Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • MVB Program
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends:

DZone.com is powered by 

AnswerHub logo