The Best Line of Defense

The Best Line of Defense

Keeping Ransomware threats exactly where they belong

Of the many challenges plaguing the security industry today, stricter compliance regulations are a top concern for many administrators. A main reason for this is because the longer data must be retained, the longer the window of opportunity for a cyberattack grows.

With IDC’s Video Surveillance Survey 2022 showing that a growing number of enterprises are expecting their video surveillance storage requirements to increase over the next three years, it is likely these windows for attacks will grow even more. Not only can a cyberattack put sensitive data into the hands of bad actors who could destroy or tamper with it, but it can also be costly. Recent data found that the average ransom paid is up over $100,000 this year, and that is not counting investigation costs.

One of the simplest and most cost-effective means to protect security data against ransomware threats is by storing a second copy in the cloud. Cloud storage offers several key benefits when it comes to fighting cyberattacks, including, zero-trust, immutability, and scalability.

Why a Zero-trust Approach to Cloud Storage is Key
Now that enterprises operate in an age of interconnected access to data, many have seen the need to adopt a less trusting model of security where focus is placed on users and their access to certain resources and data. As a result, many have adopted zero trust security, an approach that requires all members of an organization to be authenticated and authorized to access sensitive data.

A major part of zero trust that security administrators must keep an eye on is cloud storage. Since the cloud can potentially be vulnerable to cyberattacks, administrators should take added zero trust precautions. This can include end-to-end encryption, two-factor authentication, and immutable buckets. The less access users have to data, the better it is protected from malicious changes, deletion, or encryption from bad actors.

The Importance of an Having a Copy in the Cloud
Most surveillance video is still traditionally stored on premises. However, there are numerous benefits to storing a copy in the cloud, from freeing up on-site storage space, to safeguarding a copy against other security incidents like ransomware or accidental deletion.

Since the onset of the cloud, this strategy has evolved to consist of another added layer of protection, which is an immutable copy of data. An immutable layer is locked and cannot be altered or deleted. Companies leave the replication of the cloud copies to the cloud vendor.

The user backs up to one cloud location and the cloud vendor replicates the backup, remaining unseen by the corporate network.

An immutable copy of data is critical to any cybersecurity strategy, considering security administrators must plan for any kind of incident that can occur. Since most ransomware attacks occur because of human error, an additional layer of immutable backup can help restore data if it is affected by an attack.

This layer is “air gapped,” which means it is disconnected from the corporate network, making it impenetrable from potential hackers. It also helps ensure the chain of custody for evidence in investigations.

Simple Ability to Scale Up and Down
As security footage regulations change, the amount of content that the cloud must store also changes. Cloud storage allows for administrators to easily scale their storage up or down, based on demand. This is especially helpful for organizations that use motion-based cameras and have busier times of year, for example sports stadiums or schools.

For states or organizations that require longer retention time, it is even more critical to have secure cloud storage, since bad actors have more time to plan their attacks. By being able to increase or decrease cloud storage as needed, security administrators can ensure that the necessary data is being protected for the required amount of time. This way, they are meeting regulations while also keeping data and security footage safe.

Ensuring protection is not a simple task. It requires thorough planning and regular reassessment and checkups. Beyond cloud storage, organizations should ensure that they are regularly training their employees on cybersecurity best practices, such as how to spot phishing emails and updating who is authorized to access data. With regular cybersecurity assessments and proper cloud storage, security administrators can ensure that they are protecting their data from bad actors to the best of their ability.

This article originally appeared in the September / October 2023 issue of Security Today.

Featured

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

  • Creating More Versatility

    Today, AI has become top of mind for most security professionals. It is the topic of conversation in the technology world and continues to transform the way data is used to make important business decisions. Read Now

  • Report: 78 Percent of CISOs Seeing Significant Impact from AI-Powered Cyber Threats

    Darktrace recently unveiled its 2025 State of AI Cybersecurity report. The findings reveal that 78% of Chief Information Security Officers (CISOs) surveyed say that AI-powered threats are having a significant impact on their organizations, a 5% increase1 from 2024. While an increasing number of CISOs report feeling a significant impact from AI threats, more than 60% now say that they are adequately prepared to defend against these threats, an increase of nearly 15% year-over-year. However, insufficient AI knowledge and skills and a shortage of personnel and talent continue to be listed as the two top inhibitors to a successful defense. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.