Page 71 - Cyber Defense eMagazine September 2022
P. 71

have been able to quickly get services back online within a matter of a couple of hours/days. Those few
            were likely assisted by the number of cloud-based services they were using.



            Lessons from a Law Firm

            In 2020, a law firm was tasked with restoring its impacted environment, which contained a couple of on-
            premises Exchange servers (email) and a document management system. Unfortunately, their backups
            were targeted by the threat actor and these backups were impacted in such a way that trying to recover
            data from them required an extensive amount of time. For this law firm, their email servers and document
            management system were critical as their core business relies on email communications and contracts
            stored on those systems. Restoring their email servers to a functioning level took approximately 7-10
            days, increasing the firm’s stress as they were unable to operate for those days and had to resort to other
            methods to connect with their clients.

            A year later, another law firm of relatively the same size was impacted by ransomware. Fortunately for
            them, they recently migrated their email services from on-premises to Microsoft 365 and were therefore
            able to continue operating as usual. Roughly 80% of their business was up and running immediately after
            the incident happened, and only a handful of non-critical systems were impacted by the ransomware.
            Having these cloud-based solutions minimized their business impact, which allowed the law firm to keep
            calm  throughout  the  response  efforts  knowing  that  they  would  still  be  able  to  operate  and  run  their
            business.



            Building Off a Solid Foundation

            It’s clear that cloud-based services have their benefits, but it is also important to secure the data in those
            services. These services are still vulnerable to attacks and threat actors can log into these services and
            get creative with the information and services to which they are exposed. So, when you’re considering
            going to a cloud-based service, make sure to implement a few cybersecurity basics, such as:

               •  Enforcing a strong password policy.
               •  Setting up Multi-Factor Authentication (MFA) using a software or hardware token.
               •  Enhancing logging capabilities and regularly monitoring logs.
               •  Limiting the number of users with administrative roles.
               •  Implementing IP whitelisting and geo-blocking, if possible.



            When you consider making a move to a cloud-based service, it’s important to understand why you are
            doing it and if it makes sense for your organization. In most cases, it’s simple: You let someone else
            manage your services so that you don’t have to, it makes it easier to scale as needed, and allows your
            organization to focus on what matters. And if you ever get impacted by ransomware, you can more
            confidently trust that these applications will keep functioning, minimizing the stress of recovery.






            Cyber Defense eMagazine – September 2022 Edition                                                                                                                                                                                                         71
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   66   67   68   69   70   71   72   73   74   75   76