Evolving Cyber Security-MR
Why are Hyperlinks Blue-Mozilla

I sat down with Macrium’s Technical Director, John Pendleton, to discuss how the landscape of cybersecurity is changing — and how it probably always should!
Why have the lines between security, backup and storage blurred in the past few years?
The profitability of data ransom and data theft are proving to be huge. This is driving an increasing trend for multilayered and highly sophisticated attacks.
To counter this, system protection must cover all components and their interfaces, lines must be blurred otherwise you remain exposed; a single vulnerability can be used to gain a foothold to launch the next step in an attack.
A further blurring of the traditional considerations is that software now exists within every network and computer component. This software, typically called firmware, provides further opportunities for exploit.
Are backups more vulnerable to cybersecurity attacks like ransomware now than a few years ago?
A backup nullifies the leverage of a traditional ransomware attacker, as data can be quickly recovered without paying the ransom. This has driven the evolution of ransomware to also target and encrypt backup files, hence the increased vulnerability.
However, data security has two core facets, protection against loss (either accidental, hardware failure or by evil intent) and protection against theft. The threat is shifting to data theft, particularly for high value targets. In this case, backups provide no protection.
Read More at The Link Provided.
Why are Hyperlinks Blue-Mozilla

I sat down with Macrium’s Technical Director, John Pendleton, to discuss how the landscape of cybersecurity is changing — and how it probably always should!
Why have the lines between security, backup and storage blurred in the past few years?
The profitability of data ransom and data theft are proving to be huge. This is driving an increasing trend for multilayered and highly sophisticated attacks.
To counter this, system protection must cover all components and their interfaces, lines must be blurred otherwise you remain exposed; a single vulnerability can be used to gain a foothold to launch the next step in an attack.
A further blurring of the traditional considerations is that software now exists within every network and computer component. This software, typically called firmware, provides further opportunities for exploit.
Are backups more vulnerable to cybersecurity attacks like ransomware now than a few years ago?
A backup nullifies the leverage of a traditional ransomware attacker, as data can be quickly recovered without paying the ransom. This has driven the evolution of ransomware to also target and encrypt backup files, hence the increased vulnerability.
However, data security has two core facets, protection against loss (either accidental, hardware failure or by evil intent) and protection against theft. The threat is shifting to data theft, particularly for high value targets. In this case, backups provide no protection.
Read More at The Link Provided.
My Computers
System One System Two
-
- OS
- Win 11 Pro 26100.3194
- Computer type
- PC/Desktop
- Manufacturer/Model
- Dell Alienware Aurora R16
- CPU
- Intel Core i9 14900F (24 -Core, 68 MB Total Cache)
- Motherboard
- Dell Alienware
- Memory
- 32GB DDR5
- Graphics Card(s)
- RTX 4080 Super
- Sound Card
- Intel but not working
- Monitor(s) Displays
- Corsair XENEON 32QHD165
- Screen Resolution
- 2560 X 1440
- Hard Drives
- 1-2TB Samsung 990 Pro PCIe NVMe M2 SSD
1-4TB Samsung 990 Pro PCIe NVMe M2 SSD
- PSU
- 1000 Watt Platinum Dell
- Case
- Alienware
- Cooling
- Liquid Closed Loop
- Keyboard
- Corsair Strafe RGB MK.2
- Mouse
- Corsair M65 Pro
- Internet Speed
- 1000Gb's Down-20 Up
- Browser
- Firefox 135.0
- Antivirus
- Defender
- Other Info
- Very Quiet And Fast
CyberPower UPS CP1500PFCLCD
-
- Operating System
- Optimum 11 24H2 Build 26100.2454
- Computer type
- PC/Desktop
- Manufacturer/Model
- IBuypower
- CPU
- Intel Core i3 1315u
- Motherboard
- ASRock
- Memory
- 32GB DDR5
- Graphics card(s)
- PNY RTX 4017
- Sound Card
- onboard
- Monitor(s) Displays
- Dell 2419HGCF
- Screen Resolution
- 1920 X 1080
- Hard Drives
- Kingston 2TB SNV2S20006 PCIe 4.0 M.2.2280
SAMSUNG 980 PRO SSD 2TB, PCIe 4.0 M.2 2280
- PSU
- 850Watt
- Case
- Small
- Cooling
- Closed loop Liquid
- Mouse
- IBP
- Keyboard
- IBP
- Internet Speed
- 1GB
- Browser
- Firefox 133.0
- Antivirus
- Windows Defender
- Other Info
- Noisy but fast