Exfiltrated backup data that is encrypted has no value to cybercriminals because malicious actors and the public can't read the data, Poller said. If data is encrypted, only individuals who hold the keys can make sense of the data. a separate payment to prevent the public exposure of the data," he said. "This is a typical method of operation of ransomware actors who double dip by both preventing the organization from accessing their own data and holding exfiltrated data hostage. While some backup applications create backup files in a proprietary format, additional protection is necessary to keep potential attackers from easily accessing and reading these files or repositories.Įxfiltrated backup data that is encrypted has no value to cybercriminals because malicious actors and the public can't read the data. This protects the data if an attacker has access to the data storage system. This protects the data from an attacker that can see data moving across the network, for example, via a Wi-Fi connection.Įncryption at rest involves encrypting data that is stored on disk or in the backup system. Any web transaction using Secure Sockets Layer/Transport Layer Security, or SSL/TLS - such as HTTPS - is encrypted in transit. encryption at restĮncryption in transit involves encrypting data that is moving across the network, said Jack Poller, a senior analyst at ESG. "As data is backed up from point A to point B, encrypting the data in flight is highly recommended so that it can't be intercepted." Encryption in transit vs. Many regulations discuss encryption in a broad sense, and the rule of thumb should really be that this applies to backups as well," Bertrand said. "Encrypting backups can aid in regulatory compliance and protect an organization from criminal activity. Data backup encryption adds another layer of protection from major threats, including "unauthorized access, exfiltration and unauthorized data restores," said Christophe Bertrand, a practice director at TechTarget's Enterprise Strategy Group (ESG). Encryption is essential to data protection, and backups are no exception.
0 Comments
Leave a Reply. |