{"id":210277,"date":"2017-08-06T03:41:17","date_gmt":"2017-08-06T07:41:17","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloud-computing-cybersecurity-can-stop-hacking-and-ransomware-cnbc\/"},"modified":"2017-08-06T03:41:17","modified_gmt":"2017-08-06T07:41:17","slug":"cloud-computing-cybersecurity-can-stop-hacking-and-ransomware-cnbc","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloud-computing\/cloud-computing-cybersecurity-can-stop-hacking-and-ransomware-cnbc\/","title":{"rendered":"Cloud computing cybersecurity can stop hacking and ransomware &#8211; CNBC"},"content":{"rendered":"<p><p>    Ransomware attacks take two forms, according to Kaspersky Lab's    Emm. One form is extortion, where data is encrypted until the    victim pays to get it back, and the other is targeted attacks    focused on damaging data, such as the \"ExPetya\" attack.  <\/p>\n<p>    \"It wasn't possible to get the data back, so clearly this was    an attack designed to eradicate data rather than to try and    squeeze money out of victims,\" he said.  <\/p>\n<p>    It is dangerous to pay the ransom as victims are unlikely to    get the data back anyway, Emm says. The key to dealing with    ransomware is limiting exposure and mitigating the risk. For    instance, limiting data access rights within an organization    reduces exposure. Segmenting the network and having a back-up    of data will also achieve these aims.  <\/p>\n<p>    Emm recommends the \"No More Ransom\" collaboration between    Kaspersky Lab, McAfee, the Netherlands' National High Tech    Crime Unit and Europol's European Cybercrime Centre, which    helps ransomware victims to retrieve encrypted data. He says    they have been able to decrypt data in around 30 percent of    cases and helped around 29,000 people.  <\/p>\n<p>    Cloud computing is still at risk from cyberattacks, warns Emm.    While the cloud provides a good back-up of data, there's a risk    depending on when the cloud synchronizes with data affected by    ransomware; if it synchronizes at the wrong time, the encrypted    data could overwrite the clean data in the cloud.  <\/p>\n<p>    \"I'm not saying don't use that as a storage medium. I would say    maybe have different approaches. But definitely include in that    mix a back-up to a physical storage device, such as a USB or a    server somewhere, but bear in mind that any ransomware on a    system could look around at what drives are connected and    encrypt data there too,\" he says.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.cnbc.com\/2017\/08\/04\/cloud-computing-cybersecurity-defend-against-ransomware-hacks.html\" title=\"Cloud computing cybersecurity can stop hacking and ransomware - CNBC\">Cloud computing cybersecurity can stop hacking and ransomware - CNBC<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Ransomware attacks take two forms, according to Kaspersky Lab's Emm.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloud-computing\/cloud-computing-cybersecurity-can-stop-hacking-and-ransomware-cnbc\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[257743],"tags":[],"class_list":["post-210277","post","type-post","status-publish","format-standard","hentry","category-cloud-computing"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/210277"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=210277"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/210277\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=210277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=210277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=210277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}