当前位置:网站首页>Research: data security tools cannot resist blackmail software in 60% of cases
Research: data security tools cannot resist blackmail software in 60% of cases
2022-07-05 12:46:00 【Open source China Information】
Data security provider Titaniam Released a 《 Data leakage and extortion status report 》 Pointed out that , Although more than 70% Our organization has an existing set of prevention 、 Detection and backtracking solutions , But it's close 40% Our organization has been attacked by blackmail software in the past year .
The results show that , Traditional data security tools , Such as security backup and recovery tools 、 Provide static and transmission encryption solutions 、 Tokenization and data masking , stay 60% Can't protect the enterprise's data from the threat of blackmail software . The study emphasizes , The most important thing is that organizations cannot only rely on traditional data security tools to defend against data leakage and double extortion software attacks ; They also need to be able to Encrypt the data in use , To stop the trace of malicious actors .
The problem with traditional data security tools is not that they do not have strong security measures , Instead, attackers can bypass these controls by stealing credentials , To gain privileged access to key data assets .Titaniam Founder and CEO Arti Raman call , These traditional tools have no effect on blackmail software and blackmail behavior , Because the most common attack is not an attacker " intrusion ", Instead, the attacker uses stolen credentials " Sign in ". When that happens , Traditional security tools treat attackers as effective users .
“ under these circumstances , When an attacker moves in the network , They can use their credentials to decrypt like legitimate users or administrators in their daily work 、 Disassembling and uncovering data . Once the data is decrypted , The attacker will reveal it , And use it as a means of extortion .”
Raman Pointed out that , The shift to data leakage occurred in 2020 About the middle and late years of the year , At that time, cyber criminals began to integrate data leakage , In order to use backup and recovery solutions to gain greater influence on victims .
The only way to defend against typical intrusions of modern ransomware attacks is for organizations to deploy data security solutions that use encryption . Encryption in use can help hide data , It cannot be stolen by an attacker who has privileged access to enterprise resources .
The demand for enhanced data protection has driven the significant growth of the data encryption market , Researchers at 2020 The market was valued at 94.3 Billion dollars , And expect 2030 The market value will reach 423 Billion dollars .Gartner It is also expected , Data encryption will become more and more popular in the future ; Expect to 2023 year ,40% Your enterprise will have multiple sites 、 Mixed and multicolor data encryption strategies , And in the 2020 This proportion is less than 5%.
边栏推荐
- 从39个kaggle竞赛中总结出来的图像分割的Tips和Tricks
- Annotation problem and hidden Markov model
- Preliminary exploration of basic knowledge of MySQL
- Constructing expression binary tree with prefix expression
- Learning JVM garbage collection 06 - memory set and card table (hotspot)
- How to design an interface?
- Ecplise development environment configuration and simple web project construction
- Get the variable address of structure member in C language
- Comprehensive upgrade of Taobao short video photosynthetic platform
- Third party payment interface design
猜你喜欢
前几年外包干了四年,秋招感觉人生就这样了..
SAP self-development records user login logs and other information
Yum only downloads the RPM package of the software to the specified directory without installing it
Transactions on December 23, 2021
Principle of universal gbase high availability synchronization tool in Nanjing University
Resnet+attention project complete code learning
上午面了个腾讯拿 38K 出来的,让我见识到了基础的天花
[figure neural network] GNN from entry to mastery
I met Tencent in the morning and took out 38K, which showed me the basic smallpox
Migrate data from Mysql to neo4j database
随机推荐
Average lookup length when hash table lookup fails
Learn garbage collection 01 of JVM -- garbage collection for the first time and life and death judgment
Simply take stock reading notes (2/8)
Resnet+attention project complete code learning
Anaconda creates a virtual environment and installs pytorch
Sqoop import and export operation
研究:数据安全工具在 60% 的情况下无法抵御勒索软件
PXE startup configuration and principle
10 minute fitness method reading notes (2/5)
Third party payment interface design
Learn the memory management of JVM 03 - Method area and meta space of JVM
GNN(pytorch-geometric)
从39个kaggle竞赛中总结出来的图像分割的Tips和Tricks
Learn JVM garbage collection 05 - root node enumeration, security points, and security zones (hotspot)
GPON other manufacturers' configuration process analysis
ZABBIX monitors mongodb (template and deployment operations)
Neural network of PRML reading notes (1)
Difference between JUnit theories and parameterized tests
JDBC -- extract JDBC tool classes
Using docker for MySQL 8.0 master-slave configuration