BetaNews Staff

Ransomware: Recovering after an attack

ransomware laptop

Ransomware attacks have existed for decades and their perpetrators keep advancing in their abilities. By evading detection, encrypting user files, and coercing unsuspecting victims into paying ransoms, ransomware attackers have threatened the survival of many businesses. The first half of 2022 recorded a total of 236.1 million ransomware attacks across the globe.

The most popular types of ransomware attacks are crypto and locker ransomware. The crypto ransomware encrypts a user's data making it inaccessible until the individual pays the ransom, usually in bitcoin. On the other hand, locker ransomware works by blocking the user's access to the computer system and will not give access until an amount is paid. Despite the security measures businesses put in place, ransomware threats are still on the increase which is why businesses must have a ransomware recovery plan to minimize catastrophic effects.

Continue reading

Different ways of building corporate systems based on the zero trust architecture

The corporate infrastructure of US government agencies will soon be transferred to a new network security model called Zero Trust Architecture (ZTA). Last year, U.S. President Joe Biden released an Executive Order on Improving the Nation's Cybersecurity. Later, on January 26, 2022, the Federal Government released a Federal Zero Trust Architecture (ZTA) strategy memorandum that sets the rules for the construction of a new IT infrastructure for government agencies and organizations in accordance with the ZTA strategy.

In this article, I want to look at the fundamental changes that the new paradigm brings, replacing the secure perimeter model, which has so far been the base for the construction of corporate IT systems.

Continue reading

How cloud computing turned security on its head

When an organization migrates its IT systems to the cloud -- and builds new applications in the cloud -- it relieves its security team of the responsibility of building and maintaining physical IT infrastructure. The shared security model of cloud dictates that cloud service providers (CSPs) such as Amazon Web Services (AWS), Google Cloud, and Microsoft Azure are responsible for the security of the physical infrastructure. Their customers are responsible for the secure use of cloud resources.

But embracing the cloud for building and managing new applications means security teams cannot deploy the traditional security technologies and processes they’ve long relied on to thwart cyberattacks. Cloud computing represents a paradigm shift in their roles and responsibilities and their approach to protecting sensitive data against falling into the wrong hands.

Continue reading

Know the benefits of becoming a sustainable business

In business, sustainability refers to doing business without negatively impacting the environment, community, or society. Sustainability in an industry generally addresses two main categories: The effect business has on the environment and the effect business has on society.

Making environmentally conscious decisions is unavoidable for business and sustainability because it can impact the environment.

Continue reading

How to ensure a smooth transition as a new CTO

Beginning a CTO role can be a daunting prospect, especially if you’re completely new to the company. There are lots of plates to spin, people to meet and ways of working to get used to, so it’s crucial you’re on top of your game from the outset.

In effect, those first few months in the position are about learning as much as possible in a short space of time. This learning process should encompass all elements of the business, including the company itself, its culture and your colleagues. Below, we have outlined six key areas that new CTOs can focus on, to make your transition into the role as smooth as possible.

Continue reading

Digital afterlife: A chance to live forever or never rest in peace?

Have you ever thought about what happens after your physical shell expires? What legacy will you leave and what becomes of it with time? We can give our tangible belongings to friends and family. If the work is copyrighted, the protection will usually extend well beyond the author’s lifespan.

The law has, however, yet to catch up with the times as we also share, store and use tons of information online. That encompasses our digital identity, which is often left unattended after death, lingering at the digital graveyard at the mercy of tech giants.

Continue reading

Should you invest in the tech industry in a recession?

What makes a good investment during a recession? Is investing in the tech industry safe when the economy is low? Read on to learn how to use what previous recessions have taught us to choose your tech investments wisely.

If we want to know how the tech industry stands to weather the future, the first step is to look to the past. Let’s take a look at the last three U.S. recessions and their effects.

Continue reading

Three steps to making a cloud smart investment

Cloud dollars

Today, many businesses are transitioning to cloud to modernize environments, improve system reliability, advance their digital business initiatives, and support the new realities compelled by the pandemic, such as working from home. According to Gartner, "cloud is the powerhouse that drives today’s digital organizations". In fact, its growth has been little short of meteoric, with a staggering $494.7 billion spend and 20.4 Percent predicted growth in 2022

Cloud is driving increased security, increased performance, better customer experience and better value for money in tech investment, and it continues to be widely adopted by global business. But organizations are becoming more prudent and strategic in their cloud investments, centering desired business and technical outcomes when selecting the cloud model that best fits their individual needs. 

Continue reading

3 major risks enterprises face in the era of digital interconnectivity

Cloud risk

Today, enterprise-scale companies are more interconnected than ever. People, applications, servers, networks, and devices in different departments and even in different parts of the world are constantly exchanging information in both the public and private cloud. That’s not a bad thing. In fact, most organizations strive for this kind of silo-less interconnectivity. Desirable as it may be, however, it’s not risk-free.

There are cybercriminals ready to exploit any vulnerability in an organization’s digital defences. That much should be obvious from the 60 000-plus reports of fraud and cybercrime that came from UK businesses in 2021. It’s critical, therefore, that organizations do everything possible to understand and mitigate those risks.

Continue reading

Amazon's robot workforce could doom the American worker

The year is 2030. Most humans have been replaced by machines in U.S. warehouses and factories. Millions of Americans are out of work and struggling to find jobs as robots pack, sort, ship, and carry out the myriad duties that just ten years ago were the purview of living, breathing workers. There are little job prospects in sight for these workers as automation has completely taken over numerous industries.

As fictitious as this sounds, it is not a scene out of a science-fiction novel, but instead a scenario that could occur in the very near future. Take, for example, Amazon’s recent launch of Proteus -- the company’s first fully autonomous mobile robot. This should signal that much of the company’s workforce faces extinction by automation in the coming years. 

Continue reading

The risk-based approach to vulnerability patching: How to do it right

Risk dial

As businesses continue to produce and switch over to digital products, we see more cyberattacks and software flaws exploited for nefarious purposes. The number of small flaws in software that cause major issues can quickly get out of hand. Machine learning has produced a process known as risk-based vulnerability patching to help avoid this issue.

This article will discuss what a risk-based approach is, the patching processes, solutions to negate the risk of each issue, and a management plan for every part of the process. Sections will be broken down by the type of software and each part of the risk management process.

Continue reading

Taking the risk-based approach to vulnerability patching

Risk dial

As one of the most effective ways to prevent attacks on IT assets, it is universally acknowledged and known that patching vulnerabilities is a critical process. But as the volume of vulnerabilities discovered in the tools we use continues to proliferate -- and the speed at which they are being weaponized increases -- patching is becoming a complex and difficult task for security teams. During the 2021 calendar year alone, more than 20,000 individual vulnerabilities were discovered and announced, and by May 2022, more than 10,000 issues had been released. The number of vulnerabilities being discovered and disclosed is not slowing down, it is accelerating.

While the security community’s ability and attention towards discovering vulnerabilities has matured, the scale of these issues has - in tandem - become overwhelming. So what can organizations do to stay afloat in today’s "sink-or-swim" threat landscape?

Continue reading

Disaster recovery planning: A successful framework for strategy and execution

disaster plan

The rise in cyber incidents is set to continue on its meteoric trajectory over the next decade. Ransomware attacks on a business, consumer, or a device are anticipated to take place every two seconds by 2031 -- a worrying escalation from every 11 seconds in 2021. And by 2025, damages are projected to reach a staggering $15 trillion annually, up from $3 trillion in 2015, according to Cybersecurity Ventures.

At the same time, users demand better performance and user experience year-after-year, and the subsequently increased threat landscape poses real challenges in connectivity and data security. 'Insider threat' also poses a considerable risk, with 80 percent of breaches involving privileged credentials misuse or abuse and malicious insider activity from recent employees.

Continue reading

AIOps needs a new (customer-focused) approach

IT infrastructure has become incredibly complicated -- intensified by the investment in digital transformations encouraged by the pandemic. One of the unintended consequences? IT teams and incident responders are stressed, and stretched farther than ever. PagerDuty’s The State of Digital Operations lays out the increased burden on these teams, the results in terms of burnout, and the impact having a more mature digital operations can have on minimizing that stress.

AIOps is an essential component to any mature digital organization, and it’s clear a new approach is needed. The sheer volume of IT events, from changes, warnings and incidents, to tickets for more routine activity are increasing 70 percent year-on-year. At a moment when increases in budgets won’t keep pace with the explosion of incidents or the complexity of IT infrastructure (if the budgets aren’t being reduced outright), leveraging AIOps to serve teams and customers is critical.

Continue reading

Your IT systems touch multiple networks -- what's your cyber hygiene plan?

endpoint security

The world is becoming more connected via the use of cloud computing services and Internet of Things (IoT) devices. Over the last decade, we have watched cybercrimes skyrocket before our very eyes. Corporations today cannot afford to rely on basic firewalls and antivirus software to ensure data is protected. It is essential to create a more powerful cybersecurity ecosystem.

How big is the threat against data? First, take a look at how much data we are talking about here. By the year 2025, we can expect there to be 175 zettabytes of data across the internet and networked computer systems. Think streaming video, dating apps, your private healthcare information, banking data, social media posts, and messages. The list can go on.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.