The Best Line of Defense

The Best Line of Defense

Keeping Ransomware threats exactly where they belong

Of the many challenges plaguing the security industry today, stricter compliance regulations are a top concern for many administrators. A main reason for this is because the longer data must be retained, the longer the window of opportunity for a cyberattack grows.

With IDC’s Video Surveillance Survey 2022 showing that a growing number of enterprises are expecting their video surveillance storage requirements to increase over the next three years, it is likely these windows for attacks will grow even more. Not only can a cyberattack put sensitive data into the hands of bad actors who could destroy or tamper with it, but it can also be costly. Recent data found that the average ransom paid is up over $100,000 this year, and that is not counting investigation costs.

One of the simplest and most cost-effective means to protect security data against ransomware threats is by storing a second copy in the cloud. Cloud storage offers several key benefits when it comes to fighting cyberattacks, including, zero-trust, immutability, and scalability.

Why a Zero-trust Approach to Cloud Storage is Key
Now that enterprises operate in an age of interconnected access to data, many have seen the need to adopt a less trusting model of security where focus is placed on users and their access to certain resources and data. As a result, many have adopted zero trust security, an approach that requires all members of an organization to be authenticated and authorized to access sensitive data.

A major part of zero trust that security administrators must keep an eye on is cloud storage. Since the cloud can potentially be vulnerable to cyberattacks, administrators should take added zero trust precautions. This can include end-to-end encryption, two-factor authentication, and immutable buckets. The less access users have to data, the better it is protected from malicious changes, deletion, or encryption from bad actors.

The Importance of an Having a Copy in the Cloud
Most surveillance video is still traditionally stored on premises. However, there are numerous benefits to storing a copy in the cloud, from freeing up on-site storage space, to safeguarding a copy against other security incidents like ransomware or accidental deletion.

Since the onset of the cloud, this strategy has evolved to consist of another added layer of protection, which is an immutable copy of data. An immutable layer is locked and cannot be altered or deleted. Companies leave the replication of the cloud copies to the cloud vendor.

The user backs up to one cloud location and the cloud vendor replicates the backup, remaining unseen by the corporate network.

An immutable copy of data is critical to any cybersecurity strategy, considering security administrators must plan for any kind of incident that can occur. Since most ransomware attacks occur because of human error, an additional layer of immutable backup can help restore data if it is affected by an attack.

This layer is “air gapped,” which means it is disconnected from the corporate network, making it impenetrable from potential hackers. It also helps ensure the chain of custody for evidence in investigations.

Simple Ability to Scale Up and Down
As security footage regulations change, the amount of content that the cloud must store also changes. Cloud storage allows for administrators to easily scale their storage up or down, based on demand. This is especially helpful for organizations that use motion-based cameras and have busier times of year, for example sports stadiums or schools.

For states or organizations that require longer retention time, it is even more critical to have secure cloud storage, since bad actors have more time to plan their attacks. By being able to increase or decrease cloud storage as needed, security administrators can ensure that the necessary data is being protected for the required amount of time. This way, they are meeting regulations while also keeping data and security footage safe.

Ensuring protection is not a simple task. It requires thorough planning and regular reassessment and checkups. Beyond cloud storage, organizations should ensure that they are regularly training their employees on cybersecurity best practices, such as how to spot phishing emails and updating who is authorized to access data. With regular cybersecurity assessments and proper cloud storage, security administrators can ensure that they are protecting their data from bad actors to the best of their ability.

This article originally appeared in the September / October 2023 issue of Security Today.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.