The recent cyber-attack on discount retailer The Works, emphasises the need for organisations of all sizes to invest in ransomware prevention measures.
Continue readingPlease give us a few moments whilst we get your account ready.
In a private experiment at Worcester Polytechnic Institute, Amazon Web Services (AWS) got mud on their faces when a group of academics were able to sneak a peek at encryption keys temporarily stored in CPU cache. And in other news, HP has withdrawn from the public Cloud arena citing reasons of cloud-investment prudence. Oracle, on the other hand, are jumping in with both feet citing reasons of making loads and loads of money.
Wait, what? Encryption keys were stolen how?
Yes, a few well-intentioned professors were able to leverage an RSA encryption library vulnerability to scan the cache of the CPU on a machine hosting several VMs. After sifting through the heaps of information contained in said cache, they managed to glean the RSA encryption keys used by the adjacent VMs. Fortunately, their report reveals that this technique could be used on other multi-tenant cloud environments – unfortunately AWS were the lab mice this time around. The vulnerability has since been patched.
This illustrates how cloud security can be taken for granted. In an article by Network World, Yehuda Lindell, chief scientist and co-founder of security firm Dyadic, was quoted saying, “Although a difficult attack to carry out, this further highlights the fact that secret keys are vulnerable, wherever they may be. They are even more vulnerable in cloud and virtualised environments where you have less direct control. This specific attack may be prevented by appropriate patching… However, the type of attack is almost impossible to completely prevent.”
Since your backup solution is already a line of defence against data loss, you’ll need to ensure it cannot be easily compromised. So how does one attempt to “completely” prevent these types of attacks, especially concerning cloud-based backup?
So you see, your backup encryption keys might not be as safe as you thought. With all the other cloud-security considerations and mitigations to be aware of, if you can take these precautions, it will be one less thing to worry about in keeping your backup data safe from attack.
The recent cyber-attack on discount retailer The Works, emphasises the need for organisations of all sizes to invest in ransomware prevention measures.
Continue readingReading, April 28, 2022 – Redstor, the cloud-first backup platform of choice for MSPs, today announced the appointment of accomplished channel sales executive Mike Hanauer in a newly created role of Chief Revenue Officer (CRO). Known across the market for his revenue-generating successes with top data protection, recovery and security companies, Hanauer will spearhead global expansion plans for Redstor’s category-leading SaaS platform.
Continue readingThe Digital Operations Resilience Act (DORA) is the European Union’s attempt to streamline the third-party risk management process across financial institutions.
Continue reading