About Us

Rackspace Technology Announces Collaboration with Cohesity

A global provider of end-to-end, multi-cloud technology solutions company, Rackspace Technology recently established a strategic alliance with Cohesity, a leader in next-gen data management, to offer multi-cloud hosted backup and restore services to Rackspace Technology clients across the world. Rackspace Data Protection, an elevated, operating system Cohesity-Powered backup and data restoration solution that enables cybersecurity resistant automated backup and recovery across VMware-based clouds, will be available to clients as part of the agreement.

The Chief Product Officer at Rackspace Technology, Josh Prewitt, commented, “The partnership with Cohesity gives our customers access to a proven, robust data protection solution that eliminates legacy backup silos and provides comprehensive protection against the array of rising data threats they are facing, including ransomware. Customers can now manage and control data recovery from a single source, more efficiently store data, and eliminate potentially costly disruptions.”

The integration of Cohesity’s data protective barrier with VMware Cloud Director (vCD) will let SecOps and ITOps work together to better tackle cyber threats and empower customers with self-service management. Rackspace Technology is a well-known leader in the market in VMware- based cloud services, where its customers can take comfort in the fact that their data and operations performing on VMware technology are much more secure today than in the past.

DataProtect of Cohesity seems to be the cornerstone of the Rackspace Data Protection system, primarily incorporating VMware backup and recovery, as well as features like advisory services and ransomware anomaly detection and mitigation. Users of Rackspace Technology who use Rackspace Data Protection can take advantage of the potential of significant next-generation data management and protection benefits and efficiency.

John Theberge, The Vice President, Global Alliances, Service Providers, and GSIs at Cohesity, stated, “We are excited to engage in this partnership as it really addresses customers’ number one concern today, developing cyber resilience so they can quickly defend and if needed, rapidly recover data in the event of a cyberattack. Our next-gen data management capabilities, including DataProtect, give Rackspace Technology customers a simple and powerful solution that can enhance their security posture, advance protection, and improve their business resiliency.”

Read more:

What is Cloud Security?

Orca security launched the industry’s first Attack Path!

Involta Releases Air Gap Solution to Protect Crucial Data From Cybercrime

Involta, a provider of cloud computing, hybrid IT and data services firm, announced the launch of  Involta Air Gap to secure business backup, as digital migration continues to advance into the cloud. Involta Air Gap provides robust air security — the space between working and backup — to stop cyber criminals from accessing important information, significantly mitigating the severity of expensive ransomware attacks.

With increased cybercrime at corporate level, this solution is vital. Cybercrimes have increased significantly over the past year in terms of high-profile ranching campaigns and viruses, malware and DoS (denial of service). This has led to unprecedented cyber and information security spending among businesses. Research forecasts that the world will have a global cost of 11.4 million dollars every minute by the end of 2021.

“In the arena of cybersecurity, ransomware attacks target back-ups, crippling an organization’s ability to access its critical data. Involta Air Gap builds on cybersecurity measures that may already be in place and acknowledges that securing enterprise data in a separate location is critical. The premise is that a cybercriminal can’t access back-ups if there is no connection between environments. Involta Air Gap was developed to help enterprises win the war against cybercrime, especially those using AWS and Veeam cloud solutions,” said Mark Cooley, Vice President of Security and Compliance, Involta.

It continues to follow AWS’s elevated relations with AWS as the AWS Partner Network’s Advanced Consulting partner and its Veeam Cloud and Service Provider (VCSP) status in the AWS Partner Network (APN). 

Ransomware – Everything You Need Know

Ransomware is a cryptographic malware that threatens to release or permanently block access to the victim’s data until a ransom is paid. Ransomware encrypts information and documents on any device, including servers, from a single computer to an entire organization’s network. Ransomwares are part of cryptovirology. Cryptovirology is the study of the creation of effective harmful malware using encryption. 

Ransomwares encrypt the victim’s files making them unusable and demand a ransom to unlock them. Recovery of documents without the decryption key is an unsolvable problem in a properly executed cryptoviral extortion attack. The payment of ransoms is demanded in Bitcoin or other cryptocurrencies, making it impossible to track down and prosecute the culprits. 

Recent Ransomware attacks  

The WannaCry ransomware attack swept across the Internet in May 2017, employing the EternalBlue vulnerability vector. The ransomware attack, which was unparalleled in scope, infected over 230,000 devices in over 150 countries and demanded money from customers using the Bitcoin cryptocurrency in 20 different languages. At least 16 hospitals in the United Kingdom’s National Health Service (NHS) had to turn away patients or cancel scheduled surgeries. The US Colonial Pipeline was the target of a cyberattack on May 7, 2021. DarkSide was recognised by the Federal Bureau of Investigation as the culprit of the Colonial Pipeline ransomware assault, which resulted in the voluntary shutdown of the primary pipeline carrying 45 percent of petroleum to the US East Coast. 

How Attackers Attack? 
  • Ransomware comes as an email attachment – Invoice, attached document, etc. It may include a real vendor’s name or even your organization’s name. 
  • Employees’ computers are usually connected to the company’s network, shared cloud services, and so on. Without any human involvement or indication, ransomware begins encrypting all of the files it can as soon as it is launched. 
  • It then notifies the user and gives payment instructions. 
  • Some other ways are – Compromised webpages, infected removable drives, malicious software bundles.
  • Payment is mostly in Bitcoins 
 Key choices: 

– Pay the ransom and get data 

– Restore from backup 

– Lose Data 

Paying the Ransom increases Risk of Future Attacks 

The majority of cybersecurity experts don’t recommend paying a ransom in the event of a ransomware attack. Paying won’t guarantee that a company will get their data and it will encourage hackers behind ransomware attacks to keep doing what they’re doing, maintaining the illegal industry. The targets of a ransomware attacks are mostly given a time limit with the threat of deleting a particular amount of data every hour until the ransom is paid. This can be extremely stressful and unpleasant for the key management people in an organization, leading them to believe that they have no other option except to pay. The best suggestion is to be properly prepared for an attack so that enterprise firms can defend themselves. 

Ransomware and Cryptocurrency  

Bitcoins are a type of cryptocurrency, which means they don’t have a physical form. They are kept in anonymous digital wallets. They can be sent to any location. They can be paid with complete anonymity from anywhere to anywhere. Aside from the advantages, they are an excellent method of payment for illegal operations. One may claim that cryptocurrency is one of the ransomware’s enablers. After all, the software would be worthless if the hackers couldn’t safely take cash. The emergence of Bitcoin has coincided with an increase in ransomware attacks.

Security Awareness Training  

It is advised that effective security awareness training is required. Employees do not come to work with the goal of clicking on phishing emails and infecting their machines. As many IT professionals can confirm, knowing what red flags or threat is, can make all the difference in an employee’s ability to distinguish malicious links/software from legitimate traffic. 

Protection  

Investing in a renowned security solution and putting in a strong firewall is a terrific approach to protect an organization’s network. There are various security solutions like Zero-Trust Security, Web Application Firewall and Cloud Security. Keeping the security system up to date will assist security teams in detecting a ransomware infection in the early phase. 

Backup of Data 

The most important piece of advice given by anti-ransomware experts is to back up all data outside of your organization’s network. Create an isolated network or buy a service to keep the company’s backup safe from infection. It’s necessary for an enterprise firm to restore the whole system. 

Ransomwares have grown into malware that disables entire infrastructure. It won’t be surprising if ransomwares evolve in the next few years. Hence, necessary steps to secure an organization should be taken into consideration.