Ransomware and your deep pocket?

A lot of companies big names are falling victims of ransomware and I am afraid most of organizations are not well equipped to fight these new waves of attack and ending up coughing €£$.

Garmin felt victim to one of these attacks, and as a user of its services I was affected for a few days without sync my data to the right cloud services. Sorry to use this example but I couldn’t stop asking myself questions such as how are they backup and restore capability? If they fall victim to ransomware, what is their Cybersecurity defense posture? If they ending up paying the ransomware are they likely to be attacked again? And again?

I am not saying Garmin paid the ransom but other victims they do pay the ransom but the bad guys are not guaranteed to keep the words. All is known is they will attack again and ask for more €££. Make sure your backup and restore strategy works this time around.

Author: kinyoka

A certified Information Security professional, with demonstrated experience spanned more than 10 years in financial, banking, consulting, and payment card industries in managing Information Security System Management ISMS. A post graduate degree holder in Information Security Management (M.Sc); Certified Information Security Manager (CISM), Payment Card Industry Qualified Security Assessor (PCI QSA), SABSA Chartered Security Architect (SCF), ISO 27001 Lead Auditor, CREST Registered Technical Security Architect (TSA), CREST Registered Penetration Tester (CRT), and a member of ISACA. Demonstrated to be reliable, trustworthy, and meticulous person; working in a controls-focused environment, multinational, and multicultural organisation over the years and gained a good understanding of what is required of the Information Security professional. . Specialties: ISMS based on ISO/IEC 27001/2 Payment Card Industry (PCI) DSS - QSA led services - PCI Scoping, Gap Analysis and Formal Assessment (RoC) IT Governance, Risk and Compliance (GRC) Management Cyber Security Penetration Testing Enterprise Security Architecture Technical Security Architecture

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: