当前位置:网站首页>Research: data security tools cannot resist blackmail software in 60% of cases
Research: data security tools cannot resist blackmail software in 60% of cases
2022-07-05 12:46:00 【Open source China Information】
Data security provider Titaniam Released a 《 Data leakage and extortion status report 》 Pointed out that , Although more than 70% Our organization has an existing set of prevention 、 Detection and backtracking solutions , But it's close 40% Our organization has been attacked by blackmail software in the past year .
The results show that , Traditional data security tools , Such as security backup and recovery tools 、 Provide static and transmission encryption solutions 、 Tokenization and data masking , stay 60% Can't protect the enterprise's data from the threat of blackmail software . The study emphasizes , The most important thing is that organizations cannot only rely on traditional data security tools to defend against data leakage and double extortion software attacks ; They also need to be able to Encrypt the data in use , To stop the trace of malicious actors .
The problem with traditional data security tools is not that they do not have strong security measures , Instead, attackers can bypass these controls by stealing credentials , To gain privileged access to key data assets .Titaniam Founder and CEO Arti Raman call , These traditional tools have no effect on blackmail software and blackmail behavior , Because the most common attack is not an attacker " intrusion ", Instead, the attacker uses stolen credentials " Sign in ". When that happens , Traditional security tools treat attackers as effective users .
“ under these circumstances , When an attacker moves in the network , They can use their credentials to decrypt like legitimate users or administrators in their daily work 、 Disassembling and uncovering data . Once the data is decrypted , The attacker will reveal it , And use it as a means of extortion .”
Raman Pointed out that , The shift to data leakage occurred in 2020 About the middle and late years of the year , At that time, cyber criminals began to integrate data leakage , In order to use backup and recovery solutions to gain greater influence on victims .
The only way to defend against typical intrusions of modern ransomware attacks is for organizations to deploy data security solutions that use encryption . Encryption in use can help hide data , It cannot be stolen by an attacker who has privileged access to enterprise resources .
The demand for enhanced data protection has driven the significant growth of the data encryption market , Researchers at 2020 The market was valued at 94.3 Billion dollars , And expect 2030 The market value will reach 423 Billion dollars .Gartner It is also expected , Data encryption will become more and more popular in the future ; Expect to 2023 year ,40% Your enterprise will have multiple sites 、 Mixed and multicolor data encryption strategies , And in the 2020 This proportion is less than 5%.
边栏推荐
- How to connect the API interface of Taobao open platform (super detailed)
- Learn garbage collection 01 of JVM -- garbage collection for the first time and life and death judgment
- Cypher syntax of neo4j graph database
- 从39个kaggle竞赛中总结出来的图像分割的Tips和Tricks
- About cache exceptions: solutions for cache avalanche, breakdown, and penetration
- 以VMware创新之道,重塑多云产品力
- 超高效!Swagger-Yapi的秘密
- Transactions from January 14 to 19, 2022
- POJ-2499 Binary Tree
- Simply take stock reading notes (3/8)
猜你喜欢
Redis highly available sentinel cluster
Third party payment interface design
前几年外包干了四年,秋招感觉人生就这样了..
Distributed cache architecture - cache avalanche & penetration & hit rate
- [email protected] (using password"/>
Solve the error 1045 of Navicat creating local connection -access denied for user [email protected] (using password
Transactions from January 14 to 19, 2022
Solve the problem of cache and database double write data consistency
Pinduoduo flag insertion remarks API
Iterator details in list... Interview pits
Compilation principle reading notes (1/12)
随机推荐
Interviewer: is acid fully guaranteed for redis transactions?
研究:数据安全工具在 60% 的情况下无法抵御勒索软件
C language structure is initialized as a function parameter
Take you hand in hand to develop a service monitoring component
Tips and tricks of image segmentation summarized from 39 Kabul competitions
Pytorch two-layer loop to realize the segmentation of large pictures
I met Tencent in the morning and took out 38K, which showed me the basic smallpox
Transactions from January 6 to October 2022
Leetcode-1. Sum of two numbers (Application of hash table)
Handwriting blocking queue: condition + lock
GPON other manufacturers' configuration process analysis
从39个kaggle竞赛中总结出来的图像分割的Tips和Tricks
Pytoch monolayer bidirectional_ LSTM implements MNIST and fashionmnist data classification
GPON technical standard analysis I
PIP command reports an error pip is configured with locations that requires tls/ssl problems
前几年外包干了四年,秋招感觉人生就这样了..
Distributed solution - distributed lock solution - redis based distributed lock implementation
Ecplise development environment configuration and simple web project construction
Average lookup length when hash table lookup fails
10 minute fitness method reading notes (2/5)