Wednesday, January 15

Podcast: Ransomware and what information storage can do about it

videobacks.net

speak to NetApp' Chris McKean and of in securing versus them

By

: 21 Aug

In this , we take look at ransomware and storage with Chris McKean, a at NetApp.

He speaks about what storage can into storage that can and remediate versus the of . These consist of , of information and locking information versus unauthorised to alter .

McKean likewise discusses how storage anti-ransomware suits the larger of anti-ransomware in the .

What does ransomware do– in its different kinds; file , exfiltration, and so – that information storage?

McKean: Ransomware can nearly maim storage entirely, since that's the with ransomware attacks.

You've currently stated there is and exfiltration. Normally, an assailant get to a or an organisation , and among the very first once they have actually discovered the method around is they will seek to exfiltrate the information.

They will copy off much crucial information as they can, due to the fact that at that , they currently have a to to a business, “If you do us the ransom, we will these onto the for or into the ,” they' going to do that.

There's generally a -pronged – and likewise, in to having access to the information, they will then attempt to secure the information on the information storage. At that point, unless your organisation can handle having no to operate, you're going to remain in a bad method.

You most likely can' whatever services that your since whatever requires information. You understand, a or an , even if what they're accessing straight does not have much information, that will most likely have a on something even more down the line, a or an information lake. At some , it's going to require to to that information.

If that information is encrypted and the enemy, the ransomware , have the file encryption secret and they have it, you're not in a great .

What can storage integrate in to ransomware?

McKean: state there are a of sort of functions. The very first one is detection– finding something occurring at the storage .

As we've currently stated, if information is being secured, can that be identified? Can you state, “, I can see the file encryption on this storage location have begun ”? Or are we seeing - file appear that we've never ever seen before with, you understand, file ?

ยป …
Find out more

videobacks.net