The UK government has proposed extending its ban on ransomware payments to cover the entire public sector in an attempt to deter cybercriminal attacks and protect taxpayers.
A UK firm has been hit by a £3.07 million fine after being hit by a ransomware attack that exposed sensitive data related to almost 80,000 people, and disrupted NHS services.
Passwords are often more associated with individual and consumer cyber security, but they are an essential part of an organisation's overall security posture. For example, you wouldn't leave the windows open overnight as this would allow easy access into the building for thieves. In the same way, a weak password offers cyber attackers easy access to your corporate infrastructure, after which they can use these credentials to escalate permissions until they granted themselves administration privileges, at which point the risk of financial and reputational damage becomes truly serious!
Selecting the right storage architecture is essential for organisations that are leveraging Artificial Intelligence (AI), Machine Learning (ML), Big Data and IoT analytics. For example, AI applications that involve scientific and medical research create and interact with numerous large files, and therefore need a storage system that can scale to a petabyte level, with zero restrictions. Similarly, ML applications and Big Data projects require a scalable, cost-effective storage solution to accommodate the high volumes of data that will be produced. This raises the question of which storage solution enterprises should use to underpin their overall analytics strategies.
"Not-for-profit organisations have provided a trusted and valued source of independent advice for people throughout England for many years. They are a vital part of our national support infrastructure and somewhere to turn to in times of crisis."
Nick Hurd, MP
There's no doubt that the past two years have challenged the Hospitality & Leisure sectors in ways that would previously have been unimaginable, with social distancing requirements limiting the number of guests who can be hosted and making familiar processes like checking in and out significantly more complex. But, like every sector impacted by the pandemic, these challenges have inspired a new wave on innovation, as IT infrastructure has evolved to support staff and guests alike, ensuring safety does not have to come at the expense of an enjoyable stay.
Let's consider some of the ways the challenges of COVID-19 have impacted the Hospitality & Leisure sector, and how the lessons learned can - in the long term - open up new opportunities to deliver truly unforgettable experiences for every guest…
Ever since the Cloud as a concept entered the public consciousness, concerns about its perceived cyber security weaknesses have been a major obstacle to organisations - and, indeed, entire sectors - embracing digital transformation. The AEC sector, in particular, has traditionally been slow to begin the process of Cloud transformation, although the number of future-minded firms phasing out their legacy systems and embracing the scalability, agility, and operational resilience the Cloud has to offer in recent years indicates that we are seeing a shift in this regard.
In a heightened cyber threat landscape - where ransomware attacks are increasing in frequency and sophistication - and having weathered the challenges of COVID-19 and the resulting move to hybrid working, the Finance sector is still continually challenged to demonstrate to its customers that critical services will remain available no matter what, and that sensitive financial data will remain fully secure at all times.
With lockdown restrictions finally easing, and the public looking forward to enjoying the different activities they have been deprived of for the past two years, it's certainly an exciting time for the UK's Hospitality & Leisure sector. But as hotels get ready to open their doors again, it is essential that hospitality professionals do not lose sight of the challenges that will be involved.
For some years now, Cloud adoption has been steadily on the rise across the UK's Finance sector, with organisations including banks, insurers, and investment firms phasing out increasingly cumbersome legacy systems in favour of more scalable, agile, and cost-effective infrastructure. Indeed, more than 48% of UK banking services are now built on Cloud infrastructure.
After several years of serious global upheaval, it is clear that resilience, agility, and the ability to adapt to the unexpected are critical priorities for all organisations – regardless of size or sector. However, this accelerated pace of change has, in many cases, revealed the limitations of existing IT services. With an increasing emphasis on on-demand services and a highly fluid workforce, legacy services and their systems often struggle to support new propositions and customers' evolving needs, which will – in turn – make maintaining a competitive advantage difficult, if not near impossible.
On the 18th March 2024, the Information Commissioner's Office issued its updated guidance around the issuing of fines when organisations have been found liable for the integrity of their customers' or end users' data being compromised. It is already well-established now that failure to ensure critical data remains secure will result in costly fines, as we have seen repeatedly in multiple high-profile cases over the years.
Secure Access Service Edge (SASE) is rapidly establishing itself as the solution of choice for the next generation of enterprise networks, where optimal control, visibility, and scalability are essential. In the first quarter of 2024 alone, the SASE market experienced a 23% surge, as more and more organisations began taking advantage of its capabilities.
In Q3 of 2024, the CEO of a UK-based bank received an email from a ransomware group, informing him that the bank's data had been encrypted and would be released on the dark web unless a ransom demand was paid. Although several insurers and consultants were engaged to resolve the situation, the slow response times made it clear that an alternative approach would be needed.
Finally, in order to minimise the resulting downtime and resume operations as soon as possible, without giving in to the criminals' ransom demand, the organisation engaged Exponential-e to restore and secure their critical servers. With even the shortest period of downtime resulting in serious financial and reputational damage, a team of incident response specialists immediately began the restoration process, aiming to have the bank's systems back online in days rather than weeks.
The restoration process began with a thorough audit of the IT ecosystem to establish which servers had been impacted, after which the affected VMs were powered down. A new, fully isolated VDC was created to store these VMs once they were recovered, along with a completely new firewall zone.
With the affected servers restored into this new VDC zone, firewalls were established to allow for the most basic access, after which malware scans were conducted. These scans continued for two days, during which the customer was granted initial access to the servers via a temporary SSL VPN with Azure MFA, allowing them to resume operations in just three days.
At this point, Zerto replication was set up for the new VMs, while Exponential-e simultaneously engaged with the third party that was conducting a forensic investigation.
Connectivity was soon re-established for the customer's other offices, at which point users were brought back online. Firewall logs were provided for the forensic team, along with initial access to VM images via vCloud Director.
Finally, a test rebuild of the affected VMs was conducted and finalised within two days, and additional firewall policies established.
Exponential-e has repeated variations of this process for multiple other organisations affected by ransomware attacks, allowing them to resume operations as quickly as possible and ensure their critical infrastructure is secured against future attacks.
Ongoing communication between all parties involved ,including a dedicated team of incident response specialists at Exponential-e with a defined action plan ensured a seamless restoration process. Day-to-day operations resumed in just seven days, without paying the criminals' ransom demand.
Don't wait for a crisis to expose the cracks, fortify your defences today. Discover how expert response turned seven days of chaos into operational recovery.
In light of numerous dramatic shifts in the geopolitical landscape in recent months, this blog has reiterated the need for organisations across all sectors to strengthen and - if necessary - reconsider their cyber security postures, in order to prepare for the anticipated attacks by global bad actors. The legal sector is no exception, particularly as these attacks are anticipated to specifically target the most high-value data.
To Test or Not to Test? - When it comes to IT disaster recovery and remediation processes, regular testing is not a 'nice to have' - it's absolutely essential!
This isn't hyperbole on my part. You just have to look at the news on any given day. We've all heard the horror stories of organisations in both the public and private sectors experiencing prolonged downtime during disasters due to inadequate preparation, lack of testing, and the unsuitability of their legacy remediation processes and systems.