{"id":81991,"date":"2021-05-19T10:00:00","date_gmt":"2021-05-19T14:00:00","guid":{"rendered":"https:\/\/isarta.com\/news\/?p=81991"},"modified":"2021-06-02T13:15:47","modified_gmt":"2021-06-02T17:15:47","slug":"cybersecurity-did-you-save-your-data-correctly","status":"publish","type":"post","link":"https:\/\/isarta.com\/news\/cybersecurity-did-you-save-your-data-correctly\/","title":{"rendered":"Cybersecurity: Did You Save Your Data Correctly?"},"content":{"rendered":"\n<p>19 May 2021<\/p>\n\n\n\n<p><strong>Cybersecurity researcher Bertrand Milot gave a presentation on the state of cyber-piracy in Canada and around the world at the &#8220;Information Security in COVID Times (S\u00e9curit\u00e9&nbsp;de l\u2019information en temps de COVID)&#8221; conference organized by Les Affaires on March 16, 2021. The portrait made by the founder of the cybersecurity firm Bradley &amp; Rollins is chilling.<\/strong><\/p>\n\n\n\n<p>The pandemic has created a context where computer vulnerabilities have multiplied (through remote working and poor protection of computers and VPN networks), but also the vulnerability of Internet users, clicking on phishing emails thinking they will receive their screening results, have access to a miracle cure or a vaccine on the black market.<\/p>\n\n\n\n<p>In March 2020,&nbsp;<a href=\"https:\/\/www.reedsmith.com\/en\/perspectives\/2020\/03\/coronavirus-is-now-possibly-the-largest-ever-security-threat\" target=\"_blank\" rel=\"noreferrer noopener\">ReedSmith saw a 400% increase<\/a> in scams in that month. In April 2020, <a href=\"https:\/\/www.journaldugeek.com\/2020\/04\/17\/google-phishing-coronavirus\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google blocked 18 million<\/a>&nbsp;phishing and malware emails per day.<\/p>\n\n\n\n<p>Even more worrisome, the attacks have&nbsp;<a href=\"https:\/\/www.av-test.org\/en\/statistics\/malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">intensified<\/a>, become more&nbsp;<a href=\"https:\/\/mypage.webroot.com\/rs\/557-FSI-195\/images\/2020%20Webroot%20Threat%20Report_US_FINAL.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">complex\u2026<\/a>&nbsp;knowing that the pirates have also started to better organize themselves.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p><em>&#8220;We now see a real methodology of relate between organizations of cybercriminals, where an organization A offers its services of cybercrime to an organization B, to be exploited by the latter.&#8221;<\/em><\/p><\/blockquote>\n\n\n\n<p>Here is an example, taken from his lecture, where the criminal group announces its ransomware literally\u2026 &#8220;as a service&#8221; (SaaS)!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2021\/04\/Screen-Shot-2021-04-23-at-7.01.08-AM-768x476.png\" alt=\"\" width=\"581\" height=\"360\"\/><\/figure>\n\n\n\n<p>Companies are currently extremely vulnerable, says Betrand Milot.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p><em>&#8220;The only reason your company hasn\u2019t been attacked yet is not that you\u2019re well protected or lucky, it\u2019s just that cybercriminals have a capacity problem. They can\u2019t attack everyone.&#8221;<\/em><\/p><\/blockquote>\n\n\n\n<p><strong>Do not pay to recover your data<\/strong><\/p>\n\n\n\n<p>An emerging threat is the famous &#8220;ransomware&#8221;. These malware blocks access to your files by encrypting them; hackers then ask for a sum of money \u2013 sometimes in Bitcoin \u2013 to unlock it. But there is no guarantee that they will if you pay!<\/p>\n\n\n\n<p>A notable participant in the business conference was Louis-Philippe Desjardins, Senior Director of Cybersecurity at Deloitte, but also, and most importantly, Chief Information Security Officer at the STM, when the transit system suffered a ransom cyber attack, last November. The STM <a href=\"https:\/\/www.lesaffaires.com\/techno\/internet\/rancon-demandee-apres-un-piratage-a-la-stm\/620776\" target=\"_blank\" rel=\"noreferrer noopener\">refused to pay $2.8 million to recover access to one third of its servers that had been encrypted<\/a>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p><em>&#8220;Paying is never plan A, says the Director of Cybersecurity. To have the freedom to make that decision, you have to have a good backup strategy and make sure you have everything you need to take back the organization.&#8221;<\/em><\/p><\/blockquote>\n\n\n\n<p>The STM was able to do so, after a laborious effort to relaunch.<\/p>\n\n\n\n<p>The importance of making several backup copies, the famous &#8220;back-up&#8221; \u2013 incrementally, so staggered over time \u2013 and also in an isolated place in your network, is the strongest message that emerged from its presentation.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p><em>&#8220;There is a difference between having a backup and having a good backup strategy,&#8221; explained Philippe Desjardins. If you have a version in production, with a backup that is done every night and that is overwritten the next night, that is not enough. If you have a compromise and you only realize it 48 hours later, it will impact your backup copy. You have no built-in backup to restore in case of an incident.&#8221;<\/em><\/p><\/blockquote>\n\n\n\n<p>The Director of Cybersecurity advises to make incremental copies over several weeks and even months. It will then be possible. Om case of compromise, to restart your systems with a recent version &#8220;not corrupted&#8221;.<\/p>\n\n\n\n<p>You know what you have to do\u2026 Good backup!<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researcher Bertrand Milot gave presentation on the state of cyber-piracy in Canada and around the world at the &#8220;Information Security in COVID Times&#8221; conference by Les Affaires.<\/p>\n","protected":false},"author":23,"featured_media":81992,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7],"tags":[52,126,98,127],"_links":{"self":[{"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/posts\/81991"}],"collection":[{"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/comments?post=81991"}],"version-history":[{"count":7,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/posts\/81991\/revisions"}],"predecessor-version":[{"id":82056,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/posts\/81991\/revisions\/82056"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/media\/81992"}],"wp:attachment":[{"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/media?parent=81991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/categories?post=81991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isarta.com\/news\/wp-json\/wp\/v2\/tags?post=81991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}