Evolving Cyber Security-MR
Why are Hyperlinks Blue-Mozilla

I sat down with Macrium’s Technical Director, John Pendleton, to discuss how the landscape of cybersecurity is changing — and how it probably always should!
Why have the lines between security, backup and storage blurred in the past few years?
The profitability of data ransom and data theft are proving to be huge. This is driving an increasing trend for multilayered and highly sophisticated attacks.
To counter this, system protection must cover all components and their interfaces, lines must be blurred otherwise you remain exposed; a single vulnerability can be used to gain a foothold to launch the next step in an attack.
A further blurring of the traditional considerations is that software now exists within every network and computer component. This software, typically called firmware, provides further opportunities for exploit.
Are backups more vulnerable to cybersecurity attacks like ransomware now than a few years ago?
A backup nullifies the leverage of a traditional ransomware attacker, as data can be quickly recovered without paying the ransom. This has driven the evolution of ransomware to also target and encrypt backup files, hence the increased vulnerability.
However, data security has two core facets, protection against loss (either accidental, hardware failure or by evil intent) and protection against theft. The threat is shifting to data theft, particularly for high value targets. In this case, backups provide no protection.
Read More at The Link Provided.
Why are Hyperlinks Blue-Mozilla

I sat down with Macrium’s Technical Director, John Pendleton, to discuss how the landscape of cybersecurity is changing — and how it probably always should!
Why have the lines between security, backup and storage blurred in the past few years?
The profitability of data ransom and data theft are proving to be huge. This is driving an increasing trend for multilayered and highly sophisticated attacks.
To counter this, system protection must cover all components and their interfaces, lines must be blurred otherwise you remain exposed; a single vulnerability can be used to gain a foothold to launch the next step in an attack.
A further blurring of the traditional considerations is that software now exists within every network and computer component. This software, typically called firmware, provides further opportunities for exploit.
Are backups more vulnerable to cybersecurity attacks like ransomware now than a few years ago?
A backup nullifies the leverage of a traditional ransomware attacker, as data can be quickly recovered without paying the ransom. This has driven the evolution of ransomware to also target and encrypt backup files, hence the increased vulnerability.
However, data security has two core facets, protection against loss (either accidental, hardware failure or by evil intent) and protection against theft. The threat is shifting to data theft, particularly for high value targets. In this case, backups provide no protection.
Read More at The Link Provided.
My Computer
System One
-
- OS
- Win 11 Pro 22621.1413
- Computer type
- PC/Desktop
- Manufacturer/Model
- Digital Storm Velox
- CPU
- Intel Core i9-10940X
- Motherboard
- MSI X299 PRO (Intel X299 Chipset) (Up to 4x PCI-E Devices)
- Memory
- 128 GB DDR4 3200 MHz Corsair Vengance LPX
- Graphics Card(s)
- EVGA GeForce RTX 2080 Ti Black
- Sound Card
- Integrated Motherboard Audio-Realtek
- Monitor(s) Displays
- CORSAIR XENEON 32QHD
- Screen Resolution
- 2560 x 1440
- Hard Drives
-
1 Samsung 980 Pro Nvme 2TB
1x Samsung 860 Pro
1x 1TB Samsung 860 EVO
1x Storage (6TB Western Digital
- PSU
- Corsair / EVGA / Thermaltake (Modular) (80 Plus Gold)
- Case
- VELOX
- Cooling
- H20: Stage 2: Digital Storm Vortex Liquid CPU Cooler (Dual Fan) (Fully Sealed + No Maintenance)
- Keyboard
- Corsair K63 Wireless
- Mouse
- Corsair M65 Pro
- Internet Speed
- 1000Gb's Down-20 Up
- Browser
- Firefox 111.0
- Antivirus
- Windows Defender
- Other Info
-
Cyberpower CP1350AVRLCD -UPS
NVIDIA 531.29 Driver