Page 146 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 146

The best approach is to educate your employees and other members of your organisation about cyber
            security,  and  put  the  appropriate  controls  and  best  practices  in  place,  including  using  multi-factor
            authentication, implementing zero trust policies, and backing up and encrypting data.

            The IBM and Ponemon report found that the use of strong encryption – at least 256 AES, at rest and in
            transit – was a top mitigating cost factor. Organisations using strong encryption had an average breach
            cost that was 29.4 per cent lower than those using low standard or no encryption.

            When data is safely and securely encrypted, any files a cybercriminal gains access to will be worthless
            to them without an encryption key. My business, Cryptoloc, has taken this principle even further with our
            patented three-key encryption technology, which combines three different encryption algorithms into one
            unique multilayer process.

            Built for a world without perimeters, our ISO-certified technology has been deployed across multiple
            products, including Cryptoloc Secure2Client, which enables users to send fully encrypted documents
            directly from Microsoft Outlook.

            We’ve recently made Secure2Client available on the Salesforce AppExchange, so that marketing, sales,
            commerce, service and IT teams using Salesforce around the world can encrypt the reports they send to
            clients and third parties that are sensitive or confidential in nature.

            This protects Salesforce users from the potentially catastrophic ramifications of a data breach, while
            allowing them to continue using the existing application that their business is built around.

            We’ve also rolled out a new Ransomware Recovery capability that empowers users to protect and restore
            their data in real-time in the event of an attack, ensuring they never have to pay a costly ransom for the
            return of their data.

            With Ransomware Recovery, every version of every file a user stores in the Cloud is automatically saved.
            If they suspect they’ve been the victim of a ransomware attack, they can simply lock down their Cloud
            temporarily to  stop the spread  of  malware;  view  their  files’  audit trails to  determine  when  the attack
            occurred; roll back their data to the point before it was corrupted; and then unlock their Cloud.
            This  ensures  users  can  recover  their  data  as  quickly  and  effectively  as  possible,  minimising  costly
            disruptions to their business, removing the need for a lengthy and expensive investigation, and ensuring
            they never have to pay a cent to a cybercriminal to get back the data that’s rightfully theirs.

            Yes, cyber attacks are inevitable – but victimhood isn’t. If you take the right precautions, you can prevent
            costly breaches and maintain control of your precious data.















                                                                                                            146
   141   142   143   144   145   146   147   148   149   150   151