Crucial backup strategies to defend against ransomware attacks

Crucial backup strategies to defend against ransomware attacks

Ransomware payouts are trending back up. According to Chainalysis, a cryptocurrency tracing firm, 2021 was a record year for ransomware payments, totaling almost $1 billion. In 2022, there was a drop, but in 2023, ransomware payouts returned to that same torrid pace with an estimated $900 million in payments. This rise in ransomware activity can be attributed to the ramping up of ransomware group operations and a surge in extortion efforts. To avoid becoming a victim and defend against ransomware threats, you need a strong backup plan that takes into account the many ways that attackers can infiltrate your network.

Work Diagnostics

Work Diagnostics

Introducing Work Diagnostics, an integral component of the Securaze Work software suite tailored for comprehensive testing of technical device functionalities. This diagnostic tool enhances report quality, bolsters the authenticity of Securaze products, and facilitates the efficient categorization of reusable and resalable items. Empowered with Work Diagnostics, users gain a meticulous overview of their assets, enabling informed decisions regarding repair, sale, or disposal with projected revenue considerations. Purchasers of pre-owned items benefit from a certification affirming equipment status, instilling confidence and reliability.

syslog-ng Store Box Splunk/HEC and Sentinel destinations

syslog-ng Store Box Splunk/HEC and Sentinel destinations

The syslog-ng Store Box (SSB) appliance is built on syslog-ng Premium Edition (PE). SSB inherits most of syslog-ng PE’s features and makes them available with an easy-to-use graphical user interface. One of the typical use cases for SSB (and syslog-ng PE) is optimizing the logging infrastructure for SIEM / log analysis. Two recently introduced SSB destinations for log analytics are Splunk HEC (HTTP Event Collector) and Microsoft Sentinel.

MOST INSIDER DATA LEAKS ARE ACCIDENTAL

MOST INSIDER DATA LEAKS ARE ACCIDENTAL

Data breaches have become more common today. More importantly, the most newsworthy data breaches that occur are malicious, whether that is an individual or gang involved with ransomware or a disgruntled employee trying to settle a score.

Crisis averted: A recap of the OpenSSH and XZ/liblzma incident

Crisis averted: A recap of the OpenSSH and XZ/liblzma incident

A novel backdoor (CVE-2024-3094)  was recently discovered from a widely used xz-utils ‘liblzma’ data compression library build system. This backdoor reportedly targets the OpenSSH server but has the potential to target any application that integrates with ‘systemd’, uses ‘OpenSSL’, and can be contacted from the network. Pending detailed analysis of the malicious binary code injected, the full scope and impact of the backdoor are still unknown.

Business Intelligence and Log management – Opportunities and challenges

Business Intelligence and Log management – Opportunities and challenges

Business intelligence (BI) is all about making sense of huge amounts of data to extract meaningful and actionable insights out of it. Log management tools such as Graylog, instead, are the perfect solution to streamline data collection and analysis, so it’s easy to understand how these two technologies can make sense when they’re coupled together.

Data replication: What is it and what are the advantages of using it?

Data replication: What is it and what are the advantages of using it?

Data replication has moved from “nice to have” to “mainstream” for use cases such as High Availability and Disaster Recovery. At the same time, companies are discovering the need to replicate or move data for other reasons, including performance and translating transactional data into events.

Getting data to Splunk

Getting data to Splunk

Getting data to Splunk can be challenging. Syslog is still the most important data source, and it can provide you with hard-to-solve problems (for example, like high volume, non-compliant messages, unreliable network protocol (UDP), and more). The syslog-ng Premium Edition (PE) and syslog-ng Store Box (SSB) by One Identity can make these challenges manageable.

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877