“Every 14 seconds an attack occurs computer in the world. The cost of this massive war over 20,000 million euros in a year and the antivirus does not protect the data, the simple copies of security are not secure and the entities begin to show signs of fatigue in the development of protection tools”. This is the picture that describes Sergei Beloussov, the impresario of Russian origin creator of the signature of internet security Acronis.
The mayor of Miami Francis Suarez.
The objectives are multiplied and the damage is increasing. The mayor of Miami Francis Suarez, has seen how neighboring cities have been affected by the kidnapping of their systems. “Public entities are vulnerable and, when they suffer an attack, not only lose data, but, above all, the trust of the people they serve,” he says. Internet security changing course faced with this reality: attacks are inevitable, but it is not having the ability to get it all back immediately and, in this way, that what is subtracted is without value.
“Every web, every wifi, every email, every message is dangerous,” says Beloussov. The means of infection are multiplied. It is the sixth generation of attacks. “Stronger, faster, more sophisticated and they take advantage of all the world connected, from the clouds of information, cars or social media to subtitles, drones or elements apparently harmless as games or vacuum cleaners robotic,” according to Oded Vanunu, head of research at vulnerability in Check Point.
The increasing volume of security alerts makes it difficult the correct assessment and classification of threats, which causes a syndrome known as “fatigue” in the protective equipment. This situation limits the allocation of resources according to the risk. According to the Incident Response Survey of the past year 2018, 74% of professionals admitted to having responded in a year, at least, to a false positive.
it has Also changed the structure of the attackers. “At the beginning, the goal was to damage the damage. The bad guys are as an industry: they have division of labor, create cyber weapons and infiltrate without learning any connected device to get information to sell it or use it. You do not have to be immediately,” says Stanislav Protassov, head of Technology of Acronis during the first summit on cyber security organized by the company in Miami (USA) and attended by the COUNTRY as a guest along with other international media.
“you can’t build a shield against all the bullets”, he admits. The new strategy for dealing with the massive proliferation of devices and the syndrome of fatigue in the entities is, as explained by Protassov, in addition to anticipate, and prevent, the recovery of any system immediately after any incident or even in case of natural disasters. And then, to investigate to close the door to similar attacks and, if possible, to judge the authors.
“Pay is absurd.”
The key is, in any case, that the information lacks value. “It has been shown that, in many abductions, the attackers did not have the keys to decrypt the information. If the data is encrypted and you have a backup system that allows you to recover everything exactly as it was in the instant prior to the attack, it is absurd to pay a ransom,” explains the head of Technology.
Beloussov summarizes the strategy in five letters: SAPAS, which respond to the acronym in English of information safe, available, private, authentic and protected. In this sense, the creator of Acronis advocates for a system that encrypts all of the data and that these be available permanently at any place.
Graeme Hackland, chief information officer of the Formula 1 team Williams.
Graeme Hackland, chief information officer of the Formula 1 team Williams, explains how his organization suffered two kidnapping attempts and compromised the sensitive information of engineering. “For an organization like ours, it is vital not only that the data are safe, but they are available with all the guarantees, in any part of the world,” he says.
it is Also key that the whole system ensures the privacy of the information stored and who has certainty that this is authentic, that has not been manipulated. To do this we use technology blockchain, that allows you to verify that the details are identical on the various servers that support the chain of authentication. And ultimately, if the attack occurs (“While there is human there will be cyber crime, supports Beloussov), the organization has to have the ability to retrieve immediately all of the information and its software architecture by means of its own.