2016 seemed to be the year of ransomware and you would think that by now businesses would have it under control and be able to safeguard themselves, but that just doesn’t seem to be the case.
It may come as a surprise, but ransomware is not really new, it’s probably just never been this bad. It’s believed to have been around for more than 10 years already! Back in 2014, 3.2 million cases of ransomware were reported. These numbers are particularly surprising, as we know that many people don’t report cyber-crime, so the figures are probably considerably worse!
Similar to the kidnapping and ransom request of humans, ransomware is a nasty little way for hackers to steal your data and then force you to pay them to return it.
It’s usually activated by means of phishing. You receive an enticing email, click on it or open an attachment and your system is contaminated with software that’s used to encrypt all the data on the computer. When you try to access your files, the computer will present a notice demanding payment in bitcoins in order to gain access to your data. It’s frustrating and there’s little to be done to reverse it once it’s happened, unless you pay the ransom (but then there’s also no guarantee that you will get anything back either).
There’s no magic cure to avoiding a ransomware attack, but one can ensure that everything is done to limit the consequences of such an occurrence.
Protect your data
In choosing to back up your data and systems your business can’t be held to ransom if your network is breached. However, your back up strategy needs to extend beyond simply keeping a copy of your data on your computer. The best solution is to rely on the cloud for storing your data.
Why is cloud storage the answer?
Cloud systems are equipped to detect, deter and destroy ransomware attacks before the criminals are able to enter the network and gain control of data. With cloud computing, you have more visibility of the potential risks and threats faced.
Cloud back up is a fail proof way of ensuring that you don’t have to pay ransoms and worry about losing data. If your system is hacked, you have a backup safe and secure in the cloud and better yet, it’s all encrypted in cloud so pesky hackers can’t do anything with it, even if they tried.
Simply signing up for cloud storage is not enough to protect your data from ransomware. Your IT team will need to do a bit more to ensure security and take full advantage of the security features offered by the cloud. Here’s a taste of what that “bit” more includes:
- Ensure that all advanced cloud security features are understood, activated and working correctly at all times
- Take advantage of cloud services’ disaster recovery capabilities
- Educate all of your network users on the risks and threats and how to conduct themselves in a responsible and secure manner when making use of systems and networks.
It’s not really a case of IF ransomware will affect your business. It’s more a case of when. Make sure that you’re safeguarded against its potentially devastating effects by backing up to the cloud. Find out more about cloud backup features today. Get in touch with us at RMD Technology
It’s no secret that the Rhino has suffered at the hands of hard, unfeeling criminals for their horns and never more so than in the last year or two! As a result, Rhino numbers are decreasing rapidly and there’s a serious risk of extinction in the near future if nothing major is done.
While the future has seemed bleak for the Rhino, two companies have recently been involved in putting some of the world’s most advanced technology to good use: saving the Rhino.
Connected Conservation Technology
Thus far, communication has been the main downfall of rhino protection efforts. Parks and farms are remote, with limited infrastructure for communication systems. That’s all about to change though with the new technology enabling better communication.
The technology is currently being tested in a reserve that borders on the Kruger National Park, with great and measurable success
It’s a win for South Africa and the rhino!
The technology is impressive in that it doesn’t involve installing sensors and tags on the rhino. Instead, it’s designed to track the movement of people, allowing the rhinos to go about their business, undisturbed.
The equipment and technology is used to detect people before they make contact with the rhino. It does so via means of an intricate set up involving:
- a secured area network
- CCTV and biometric scanning
- Wi-Fi and LAN stationed at all entrances
- LORA technology
- sensors installed on the periphery of the reserve
- thermal imaging
- access to a national data base
- connection to multiple devices and shared data
- automatic backup features
- threat alerts
- predictive modelling
- access to a helicopter response team.
Of course the system is and must be secure, encrypted and protected against third party access.
The companies involved in the development and implementation of the technology and system hope to replicate it in many, if not all of the parks in SA. They also believe that it could be used to protect other endangered species including the likes of elephant, pangolin, tigers and sea rays.
Have you heard any positive stories on how technology is helping nature and people? We would love for you to share your stories of technological success with us.