the new threat on campus: ransomware locks down education

24
RANSOMWARE LOCKS DOWN EDUCATION The new threat on campus:

Upload: code42

Post on 21-Feb-2017

603 views

Category:

Education


3 download

TRANSCRIPT

RANSOMWARE LOCKS DOWN EDUCATION

The new threat on campus:

in ransom payments in 2016$1B

1,425% ROI

Sources: FBI, TrustWave

RANSOMWARE IS A BOOMING BUSINESS

Sophisticated Black Market

Cheap Exploit Kits

Ransom-as-a-Service (RaaS)

IT’S ONLY GETTING WORSE

Sources: FBI, TrustWave

Tuesday, January 17. 2017

Hollywood, California

METRO NEWS

HOLLYWOOD PRESBYTERIAN

HOSPITAL PAYS $17,000 RANSOM

HEALTHCARE HACKS MAKE HEADLINES

Source: Bitsight

4X MORE LIKELY

BUT EDUCATIONAL INSTITUTIONS ARE ALMOST

TO GET HIT WITH RANSOMWARE

EDUCATION

Source: Bitsight

IS NOW THE

FOR RANSOMWARETOP TARGET

1. DECENTRALIZED IT

> 3 Reasons Why Education is So Vulnerable

DIFFERENT DEPARTMENTS—DIFFERENT TECH

INCONSISTENCIES CREATE HOLESRANSOMWARE FINDS THE VULNERABILITIES

SPEAR PHISHING MADE EASY“Higher education institutions have become particularly vulnerable to ‘spear phishing.’”

– 2016 Beazley Breach Insights Report

INBOX

SEARCH

CONTACTS

SETTINGS

SUBJECT: URGENTTo: All DepartmentsFrom: The Dean

Please review the attached document immediately.

12/12/2016

2. ONCE RANSOMWARE HITS, IT SPREADS EASILY

> 3 Reasons Why Education is So Vulnerable

COLLABORATIVE CULTURE“The relatively open nature of campus IT systems…

and a lack of restrictive controls…make higher education institutions particularly

vulnerable to breaches.”- Beazley Breach Insights

FILE SYNC & SHARE SPREADS THE INFECTION

3. USERS HOLD VALUABLE DATA

> 3 Reasons Why Education is So Vulnerable

Security policy can’t fix unpredictable users

EDUCATION HAS ALL THE TRADITIONAL TARGETS

Student Records Financial Data Proprietary Research

THE BIG TARGET:

INTELLECTUALPROPERTY

(IP)

THE IDEAS THAT DRIVE EDUCATION & RESEARCH

RANSOMWARE + USER ERROR

“A developer was infected by ransomware just as she was completing a major project, and she hadn’t backed up her work to the server. She thought her work was lost

and would surely have to pay, but with Code42 CrashPlan, we were able to get her data back.”

— Diana Williams, Sr. Systems Administrator, University of Georgia, Code42 CrashPlan user

A Costly Combo

IDEAS AREN’T CREATED ON SERVERS

INTELLECTUAL PROPERTY LIVES ON DEVICES

ENDPOINT DATA:A MAJOR BLIND SPOT

What data lives on the devices? Is that data backed up?

LEGACY BACKUP & RESTORE CAN’T BE TRUSTED

User-dependent Backups

Infrequent Backups

File SizeLimitations

Unreliable Restores

SYNC & SHARE ≠ BACKUP

+ + =Incomplete Data Repositories

Synced Encryption

Limited Versioning

End User Data Loss

1. COMPREHENSIVE DATA BACKUP Never lose your data. Never pay the ransom.2. UNLIMITED FILE VERSIONING Make a clean point-in-time restore.3. USER PROFILE BACKUP Restore user settings and get users back to work.4. SELF-SERVICE RESTORES Reduce IT costs and minimize downtime.

> 4 Steps to Ransomware Preparedness

THE BIG PICTURE: PLUGGING

HOLES WITH CENTRALIZED

DATA SECURITY

BENEFITS OF A CENTRALDATA SECURITY POSTURE• Eliminate gaps and blind spots• Enable complete visibility• Ensure comprehensive backup• Respond and recover faster

WHY CODE42?DON’T TAKE OUR WORD FOR IT

7Only enterprise backup

provider trusted by Internet2 consortium

Ivy league schools trust Code42

to secure their data

of8

ARE YOU PREPARED FOR RANSOMWARE?

LET’S TALK.code42.com/contact