All organizations have become more vigilant in detecting and rooting out ransomware in their IT environments. However, increasing perimeter cybersecurity defenses has resulted in hackers creating ransomware strains that are even more difficult to detect. To uncover these more elusive strains, more data protection solutions now include anomaly detection to help identify them. Targeted Ransomware Attacks Mounting a viable cybersecurity defense requires organizations to go beyond deploying firewalls and antivirus software. Hackers often research an organization before initiating a targeted ransomware attack. By researching an organization, hackers may obtain specific information about it, such as its employees, IT infrastructure, and…
The Advantages of Cloud Desktops in DR and Business Continuity
By BRAD PETERSON The combination of remote work and sudden outages doesn’t have to shut an organization down. Provider outages...
READ MORE >
Structuring Recovery and Business Continuity in an Unstructured Environment
Disaster recovery and business continuity must function now in a far more risk-laden and complex environment. While ransomware threats continue...
READ MORE >
The Role the NIST Framework Should Play in Creating a Cyber Secure DR Infrastructure
Any organization irrespective of its size must acknowledge the reality of cybersecurity threats. Further, no organization can or should assume...
READ MORE >
What We Tend to Forget About Crisis Communication
Subscribe to the Business Resilience DECODED podcast – from DRJ and Asfalis Advisors – on your favorite podcast app. New...
READ MORE >