{"id":135712,"date":"2023-12-27T07:00:00","date_gmt":"2023-12-27T06:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=135712"},"modified":"2023-12-19T10:11:50","modified_gmt":"2023-12-19T09:11:50","slug":"cyber-threats-such-as-ransomware","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/cyber-threats-such-as-ransomware\/","title":{"rendered":"Cyber Threats Such as Ransomware"},"content":{"rendered":"<p>Many organizations rely on the SAP Hana database, which makes database protection a must. Nevertheless, many companies only consider modern IT security when it is already too late. Downtime, serious data leaks, loss of image and trust are potential consequences. However, companies can prevent the effects of ransomware by relying on three pillars to protect their most valuable asset - their data.&nbsp;<\/p>\n\n\n\n<p>Until recently, many employees worked exclusively in the office and only experts were able to use ransomware efficiently. Those days are over. Workplaces are no longer restricted to specific physical locations and ransomware as a service means that even criminals with little technical knowledge can commission blackmail campaigns via the darknet. Despite these developments, too many companies continue to rely on traditional approaches to perimeter protection when it comes to data security. However, once this has been penetrated, attackers often have an easy time of it.<\/p><div id=\"great-3528872904\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>The new Rubrik Zero Labs Report, for which more than 1600 IT security managers were surveyed, shows just how devastating this is. For example, 48 percent of German IT experts believe that data growth is already exceeding their ability to secure data and manage risks. 98 percent of the organizations surveyed are of the opinion that they currently have considerable problems with data visibility. In addition, more than a quarter of companies (27%) recorded a significant loss of sensitive data in 2022.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Endpoint Security<\/h2>\n\n\n\n<p>Once endpoint security has been overcome, attackers can swim along unnoticed in the perpetual stream of an organization's data growth. The fact that this will happen at some point is no longer a question of if, but when.<\/p>\n\n\n\n<p>The primary goal of a modern cyber security strategy is to limit the impact of a successful attack as much as possible. Specifically, every organization should build its strategy on three pillars: Data Resilience, Data Observability and Data Remediation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Data Resilience<\/h2>\n\n\n\n<p>Those responsible create data resilience by using unchangeable backup copies based on zero-trust principles. Once written, they cannot be changed afterwards. This means that even ransomware cannot encrypt the backup copies. This ensures that data and systems can be restored.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Data Observability<\/h2>\n\n\n\n<p>In addition, continuous data monitoring across the entire IT environment (including data backup) should detect sensitive data (data observability) in order to identify indicators of a threat. This includes understanding who has access to which data, what it is used for and when, and where it is stored.<\/p>\n\n\n\n<p>In a ransomware incident, the ransom payment for decryption is not the main cost. The following costs may also be incurred: Downtime costs, external consulting and personnel costs, further extortion with stolen data, data protection measures, patent infringements, loss of sales due to loss of customers and competitive advantages, damage to image and negative media coverage, costs for investigations, replacement measures and legal disputes.<\/p>\n\n\n\n<p>It is therefore important that the recovery (data remediation) of data and applications is guaranteed reliably and quickly.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.rubrik.com\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/www.rubrik.com\/\" rel=\"noreferrer noopener\">rubric.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Current cyber threats such as ransomware jeopardize entire operations by encrypting data and systems. This can lead to a super-GAU if companies are reliant on real-time analysis.<\/p>","protected":false},"author":2368,"featured_media":135208,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[7,21,43707],"tags":[],"coauthors":[39720],"class_list":["post-135712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-it-security","category-mag-23-12","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/11\/It-Security-1000x450-1-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Aktuelle Cyberbedrohungen wie Ransomware gef\u00e4hrden komplette Betriebsabl\u00e4ufe, indem sie Daten und Systeme verschl\u00fcsseln. Das kann zu einem Super-GAU f\u00fchren, wenn Unternehmen auf Echtzeitanalysen angewiesen sind.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-23-12\/\" rel=\"category tag\">MAG 23-12 \/ 24-01<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e3_magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/135712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=135712"}],"version-history":[{"count":2,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/135712\/revisions"}],"predecessor-version":[{"id":135717,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/135712\/revisions\/135717"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/135208"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=135712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=135712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=135712"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=135712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}